19:58:54 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x700}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:54 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2048.042084][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2048.064324][T25591] bridge0: port 1(bridge_slave_0) entered disabled state [ 2048.117117][T25595] overlayfs: failed to resolve './file0': -2 [ 2048.153344][ T35] audit: type=1804 audit(1611172734.989:91): pid=25595 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2306/bus/file0" dev="sda1" ino=15814 res=1 errno=0 [ 2048.232172][ T35] audit: type=1804 audit(1611172735.029:92): pid=25595 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2306/bus/file0" dev="sda1" ino=15814 res=1 errno=0 19:58:55 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005051201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:58:55 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x110088fe, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:58:55 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xa00000000000000}, 0x0) 19:58:55 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x900}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:55 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2048.305057][T25598] bridge0: port 1(bridge_slave_0) entered blocking state [ 2048.312239][T25598] bridge0: port 1(bridge_slave_0) entered forwarding state 19:58:55 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xa00}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2048.455799][T25612] overlayfs: failed to resolve './file0': -2 [ 2048.509494][ T35] audit: type=1804 audit(1611172735.349:93): pid=25619 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2307/bus/file0" dev="sda1" ino=16072 res=1 errno=0 [ 2048.580806][T25601] bridge0: port 1(bridge_slave_0) entered disabled state 19:58:55 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:58:55 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xc00}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2048.770247][T25628] overlayfs: failed to resolve './file0': -2 19:58:55 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2048.977533][T25636] overlayfs: failed to resolve './file0': -2 [ 2049.010472][T25625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2049.017720][T25625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2049.087562][T25627] bridge0: port 1(bridge_slave_0) entered disabled state [ 2049.264261][T25598] bridge0: port 1(bridge_slave_0) entered blocking state [ 2049.271416][T25598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2049.297537][T21379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2049.318936][T25625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2049.326182][T25625] bridge0: port 1(bridge_slave_0) entered forwarding state 19:58:56 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100241148ff051005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:58:56 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xf00}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:56 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:58:56 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005061201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:58:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xb00000000000000}, 0x0) 19:58:56 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x40000000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2049.436301][T25649] overlayfs: failed to resolve './file0': -2 19:58:56 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x131b}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:56 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2049.559525][T25656] bridge0: port 1(bridge_slave_0) entered disabled state [ 2049.678142][T25672] overlayfs: failed to resolve './file0': -2 19:58:56 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x1b13}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2049.896356][T25685] overlayfs: failed to resolve './file1': -2 [ 2049.919762][ T35] kauditd_printk_skb: 9 callbacks suppressed 19:58:56 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x2000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2049.919775][ T35] audit: type=1804 audit(1611172736.759:103): pid=25685 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2312/bus/file0" dev="sda1" ino=16166 res=1 errno=0 19:58:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2050.025646][ T35] audit: type=1804 audit(1611172736.799:104): pid=25685 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2312/bus/file0" dev="sda1" ino=16166 res=1 errno=0 [ 2050.103970][T25693] overlayfs: failed to resolve './file1': -2 [ 2050.141989][ T35] audit: type=1804 audit(1611172736.949:105): pid=25693 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2313/bus/file0" dev="sda1" ino=15832 res=1 errno=0 [ 2050.216120][T25665] __nla_validate_parse: 22 callbacks suppressed [ 2050.216137][T25665] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2050.252072][ T35] audit: type=1804 audit(1611172736.949:106): pid=25693 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2313/bus/file0" dev="sda1" ino=15832 res=1 errno=0 [ 2050.300335][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2050.318253][T25670] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2050.409716][T25676] bridge0: port 1(bridge_slave_0) entered disabled state [ 2050.510058][T25666] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2050.520246][T25666] bridge0: port 1(bridge_slave_0) entered blocking state [ 2050.527495][T25666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2050.538063][T25694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2050.628660][T25656] bridge0: port 1(bridge_slave_0) entered disabled state 19:58:57 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100241248ff051005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:58:57 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x4788}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2050.721869][T25665] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2050.736754][T25670] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2050.778210][T25670] bridge0: port 1(bridge_slave_0) entered blocking state [ 2050.785415][T25670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2050.856192][T25702] bridge0: port 1(bridge_slave_0) entered disabled state [ 2050.869697][T25708] overlayfs: failed to resolve './file1': -2 [ 2050.880023][ T35] audit: type=1804 audit(1611172737.719:107): pid=25708 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2314/bus/file0" dev="sda1" ino=15981 res=1 errno=0 [ 2050.930514][ T35] audit: type=1804 audit(1611172737.749:108): pid=25708 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2314/bus/file0" dev="sda1" ino=15981 res=1 errno=0 19:58:57 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005071201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:58:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xc00000000000000}, 0x0) 19:58:57 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x4888}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:57 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x6499baff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:58:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2051.104078][T25709] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2051.132609][T25709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2051.139917][T25709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2051.248834][T25710] bridge0: port 1(bridge_slave_0) entered disabled state 19:58:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:58:58 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x5865}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:58 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x6000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2051.739828][T25721] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2051.779815][T25724] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2051.789635][T25724] bridge0: port 1(bridge_slave_0) entered blocking state [ 2051.797073][T25724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2051.816148][T25725] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2051.848491][T25731] bridge0: port 1(bridge_slave_0) entered disabled state [ 2052.008629][T25709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2052.015798][T25709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2052.106223][T25713] bridge0: port 1(bridge_slave_0) entered disabled state 19:58:59 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100241848ff051005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:58:59 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x6558}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2052.229334][T25724] bridge0: port 1(bridge_slave_0) entered blocking state [ 2052.236508][T25724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2052.276701][T25734] bridge0: port 1(bridge_slave_0) entered disabled state [ 2052.475078][T25764] bridge0: port 1(bridge_slave_0) entered blocking state [ 2052.482307][T25764] bridge0: port 1(bridge_slave_0) entered forwarding state 19:58:59 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005081201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:58:59 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 19:58:59 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8100}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:58:59 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x79000000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2052.522708][T25765] bridge0: port 1(bridge_slave_0) entered disabled state 19:58:59 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8847}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:58:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:58:59 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8848}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2053.010364][T25779] bridge0: port 1(bridge_slave_0) entered blocking state [ 2053.017637][T25779] bridge0: port 1(bridge_slave_0) entered forwarding state 19:58:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2053.069046][T25786] bridge0: port 1(bridge_slave_0) entered disabled state [ 2053.221412][ T35] audit: type=1804 audit(1611172740.060:109): pid=25808 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2321/bus/file0" dev="sda1" ino=16107 res=1 errno=0 [ 2053.286562][ T35] audit: type=1804 audit(1611172740.070:110): pid=25808 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2321/bus/file0" dev="sda1" ino=16107 res=1 errno=0 [ 2053.422428][T25764] bridge0: port 1(bridge_slave_0) entered blocking state [ 2053.429634][T25764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2053.447546][T25765] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:00 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240308ff051005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:00 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x40000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2053.553405][T25779] bridge0: port 1(bridge_slave_0) entered blocking state [ 2053.560635][T25779] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:00 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005091201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x1000000000000000}, 0x0) 19:59:00 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x94f81ee5, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2053.656589][ T35] audit: type=1804 audit(1611172740.500:111): pid=25815 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2322/bus/file0" dev="sda1" ino=16007 res=1 errno=0 [ 2053.712367][T25822] bridge0: port 1(bridge_slave_0) entered blocking state [ 2053.719623][T25822] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:00 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x1000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2053.790359][ T35] audit: type=1804 audit(1611172740.520:112): pid=25815 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2322/bus/file0" dev="sda1" ino=16007 res=1 errno=0 [ 2053.823644][T25822] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:00 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x2000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:00 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x3000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x4000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2054.297487][T25831] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:01 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001002403481c051005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x5000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:01 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050a1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x1100000000000000}, 0x0) 19:59:01 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x9effffff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2054.646177][T25873] bridge0: port 1(bridge_slave_0) entered blocking state [ 2054.653425][T25873] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x6000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2054.716615][T25873] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x7000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2055.082802][T25902] overlayfs: missing 'lowerdir' 19:59:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2055.104765][ T35] kauditd_printk_skb: 8 callbacks suppressed [ 2055.104779][ T35] audit: type=1804 audit(1611172741.950:121): pid=25902 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2327/bus/file0" dev="sda1" ino=15919 res=1 errno=0 [ 2055.205344][ T35] audit: type=1804 audit(1611172741.950:122): pid=25902 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2327/bus/file0" dev="sda1" ino=15919 res=1 errno=0 [ 2055.238155][T25876] __nla_validate_parse: 19 callbacks suppressed [ 2055.238170][T25876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:02 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348fe051005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:02 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x9000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2055.258517][T25907] overlayfs: missing 'lowerdir' [ 2055.276590][ T35] audit: type=1804 audit(1611172742.120:123): pid=25907 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2328/bus/file0" dev="sda1" ino=15878 res=1 errno=0 19:59:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2055.340372][T25880] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2055.361843][T25880] bridge0: port 1(bridge_slave_0) entered blocking state [ 2055.369499][T25880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2055.387995][ T35] audit: type=1804 audit(1611172742.150:124): pid=25907 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2328/bus/file0" dev="sda1" ino=15878 res=1 errno=0 [ 2055.410100][T25884] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2055.462345][T25882] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2055.521891][T25885] bridge0: port 1(bridge_slave_0) entered disabled state [ 2055.554744][T25918] overlayfs: missing 'lowerdir' [ 2055.579969][ T35] audit: type=1804 audit(1611172742.420:125): pid=25918 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2329/bus/file0" dev="sda1" ino=15753 res=1 errno=0 [ 2055.620757][ T35] audit: type=1804 audit(1611172742.460:126): pid=25918 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2329/bus/file0" dev="sda1" ino=15753 res=1 errno=0 [ 2055.772638][T25916] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2055.797486][T25916] bridge0: port 1(bridge_slave_0) entered blocking state [ 2055.804731][T25916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2055.827439][T25892] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2055.838032][T25892] bridge0: port 1(bridge_slave_0) entered blocking state [ 2055.845245][T25892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2055.854581][T25922] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2055.878416][T25921] bridge0: port 1(bridge_slave_0) entered disabled state [ 2056.062587][T25925] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:03 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050b1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:03 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xa000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x6000000000000000}, 0x0) 19:59:03 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xaa000000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2056.155702][T25916] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2056.170054][T25916] bridge0: port 1(bridge_slave_0) entered blocking state [ 2056.177271][T25916] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:03 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff021005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2056.274212][T25941] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2056.287568][T25938] overlayfs: missing 'lowerdir' [ 2056.304198][T25941] bridge0: port 1(bridge_slave_0) entered blocking state [ 2056.311379][T25941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2056.326128][ T35] audit: type=1804 audit(1611172743.170:127): pid=25938 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2330/bus/file0" dev="sda1" ino=16377 res=1 errno=0 19:59:03 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xc000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2056.384435][T25937] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 19:59:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2056.420759][ T35] audit: type=1804 audit(1611172743.170:128): pid=25938 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2330/bus/file0" dev="sda1" ino=16377 res=1 errno=0 [ 2056.501094][T25946] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:03 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xf000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2056.569654][T25965] overlayfs: missing 'lowerdir' [ 2056.576608][ T35] audit: type=1804 audit(1611172743.420:129): pid=25965 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2331/bus/file0" dev="sda1" ino=16379 res=1 errno=0 19:59:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2056.643963][ T35] audit: type=1804 audit(1611172743.460:130): pid=25965 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2331/bus/file0" dev="sda1" ino=16379 res=1 errno=0 19:59:03 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x10000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2056.791645][T25973] overlayfs: missing 'lowerdir' 19:59:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2056.968157][T25957] bridge0: port 1(bridge_slave_0) entered disabled state [ 2056.991815][T25980] overlayfs: missing 'lowerdir' [ 2057.210815][T25941] bridge0: port 1(bridge_slave_0) entered blocking state [ 2057.218031][T25941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2057.248073][T25982] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:04 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050c1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:04 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x131b0000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x6558000000000000}, 0x0) 19:59:04 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xac000000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:04 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff061005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2057.508793][T25993] overlayfs: missing 'lowerdir' [ 2057.546368][T26003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2057.554524][T26003] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:04 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x20000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2057.613721][T26009] bridge0: port 1(bridge_slave_0) entered blocking state [ 2057.620893][T26009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2057.666346][T26011] bridge0: port 1(bridge_slave_0) entered disabled state [ 2057.765500][T26017] overlayfs: missing 'lowerdir' 19:59:04 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x60000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:04 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x65580000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2058.004591][T26027] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 2058.037500][T26027] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 19:59:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2058.138383][T26003] bridge0: port 1(bridge_slave_0) entered blocking state [ 2058.145629][T26003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2058.212268][T26013] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:05 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050d1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:05 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x81000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:05 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xe0ffffff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x8000000000000000}, 0x0) [ 2058.320242][T26037] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 2058.355228][T26037] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 19:59:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2058.578700][T26059] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 2058.588665][ T6230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2058.598337][T26059] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 2058.609176][T26009] bridge0: port 1(bridge_slave_0) entered blocking state [ 2058.618059][T26009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2058.674810][T26054] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:05 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff081005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:05 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x88470000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2058.870803][T26053] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:05 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x88480000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2058.988057][T26075] overlayfs: unrecognized mount option "upper" or missing value 19:59:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2059.092709][T26080] bridge0: port 1(bridge_slave_0) entered blocking state [ 2059.099887][T26080] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:06 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xe51ef894, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x8100000000000000}, 0x0) [ 2059.325258][T26081] bridge0: port 1(bridge_slave_0) entered disabled state [ 2059.387434][T26095] overlayfs: unrecognized mount option "upper" or missing value [ 2059.599171][T26049] bridge0: port 1(bridge_slave_0) entered blocking state [ 2059.606526][T26049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2059.625443][T26060] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:06 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050e1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:06 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x88a8ffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2059.759938][T26080] bridge0: port 1(bridge_slave_0) entered blocking state [ 2059.767105][T26080] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:06 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x9effffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2059.891035][T26114] overlayfs: unrecognized mount option "upper" or missing value 19:59:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2059.994248][T26084] bridge0: port 1(bridge_slave_0) entered disabled state [ 2060.179852][T26126] overlayfs: workdir and upperdir must be separate subtrees [ 2060.198069][ T35] kauditd_printk_skb: 20 callbacks suppressed [ 2060.198081][ T35] audit: type=1804 audit(1611172747.041:151): pid=26126 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2342/bus/file0" dev="sda1" ino=16375 res=1 errno=0 [ 2060.277563][ T35] audit: type=1804 audit(1611172747.081:152): pid=26126 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2342/bus/file0" dev="sda1" ino=16375 res=1 errno=0 19:59:07 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff091005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:07 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xc3ffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2060.335931][T26100] __nla_validate_parse: 23 callbacks suppressed [ 2060.335948][T26100] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2060.369057][T26098] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2060.391514][T26117] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2060.423865][T26117] bridge0: port 1(bridge_slave_0) entered blocking state [ 2060.431084][T26117] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x8847000000000000}, 0x0) 19:59:07 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xefffffff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2060.489950][T26134] overlayfs: workdir and upperdir must be separate subtrees [ 2060.515934][T26120] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:07 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xefffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2060.534882][ T35] audit: type=1804 audit(1611172747.381:153): pid=26134 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2343/bus/file0" dev="sda1" ino=16373 res=1 errno=0 19:59:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2060.649216][ T35] audit: type=1804 audit(1611172747.381:154): pid=26134 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2343/bus/file0" dev="sda1" ino=16373 res=1 errno=0 [ 2060.752908][T26153] overlayfs: workdir and upperdir must be separate subtrees [ 2060.777891][ T35] audit: type=1804 audit(1611172747.621:155): pid=26153 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2344/bus/file0" dev="sda1" ino=16363 res=1 errno=0 [ 2060.871179][ T35] audit: type=1804 audit(1611172747.651:156): pid=26153 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2344/bus/file0" dev="sda1" ino=16363 res=1 errno=0 [ 2060.959471][T26137] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2060.969296][T26137] bridge0: port 1(bridge_slave_0) entered blocking state [ 2060.976621][T26137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2061.001949][T26139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2061.039966][T26140] bridge0: port 1(bridge_slave_0) entered disabled state [ 2061.180757][T26152] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2061.209660][T26117] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2061.219490][T26117] bridge0: port 1(bridge_slave_0) entered blocking state [ 2061.226743][T26117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2061.245347][T26155] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:08 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050f1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:08 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xf0ffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2061.346138][T26143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2061.366041][T26152] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 19:59:08 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xf0ffffff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:08 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff181005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x8848000000000000}, 0x0) [ 2061.498864][T26171] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2061.510713][T26168] overlayfs: failed to resolve './fil': -2 [ 2061.538997][ T35] audit: type=1804 audit(1611172748.381:157): pid=26168 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2345/bus/file0" dev="sda1" ino=16182 res=1 errno=0 [ 2061.546105][T26171] bridge0: port 1(bridge_slave_0) entered blocking state [ 2061.570146][T26171] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:08 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xfcffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2061.678312][ T35] audit: type=1804 audit(1611172748.411:158): pid=26168 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2345/bus/file0" dev="sda1" ino=16182 res=1 errno=0 [ 2061.725579][T26178] bridge0: port 1(bridge_slave_0) entered blocking state [ 2061.732818][T26178] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:08 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xfeffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2061.783580][T26179] bridge0: port 1(bridge_slave_0) entered disabled state [ 2061.883310][T26195] overlayfs: failed to resolve './fil': -2 [ 2061.910578][ T35] audit: type=1804 audit(1611172748.751:159): pid=26195 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2346/bus/file0" dev="sda1" ino=16379 res=1 errno=0 19:59:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:08 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffff0000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2062.000961][ T35] audit: type=1804 audit(1611172748.761:160): pid=26195 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2346/bus/file0" dev="sda1" ino=16379 res=1 errno=0 19:59:09 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffffa888}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2062.197197][T26204] overlayfs: failed to resolve './fil': -2 [ 2062.320488][T26183] bridge0: port 1(bridge_slave_0) entered disabled state [ 2062.543387][T26171] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.550742][T26171] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:09 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005101201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:09 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffffff7f}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:09 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfc000000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:09 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff1c1005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 19:59:09 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffffff9e}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2062.773525][T26233] overlayfs: failed to resolve './file': -2 [ 2062.824099][T26237] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.831236][T26237] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2062.899525][T26249] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:09 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffffffc3}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2063.080926][T26258] overlayfs: failed to resolve './file': -2 19:59:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:10 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffffffef}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:10 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xfffffff0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2063.270041][T26265] overlayfs: failed to resolve './file': -2 [ 2063.368208][T26248] bridge0: port 1(bridge_slave_0) entered disabled state [ 2063.581032][T26237] bridge0: port 1(bridge_slave_0) entered blocking state [ 2063.588219][T26237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2063.612190][T26238] bridge0: port 1(bridge_slave_0) entered blocking state [ 2063.619318][T26238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2063.654746][T26274] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:10 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005111201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:10 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xfffffffc}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:10 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfc020000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2063.780769][ T1433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2063.790612][T26237] bridge0: port 1(bridge_slave_0) entered disabled state [ 2064.064415][T26287] bridge0: port 1(bridge_slave_0) entered blocking state [ 2064.071646][T26287] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:10 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff050205001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x99155e8100000000}, 0x0) 19:59:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:11 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xfffffffe}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:11 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x4000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2064.317388][T26291] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:11 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x100000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(0x0, 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2064.690656][T26312] bridge0: port 1(bridge_slave_0) entered blocking state [ 2064.697862][T26312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2064.743103][T26318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2065.005766][T26287] bridge0: port 1(bridge_slave_0) entered blocking state [ 2065.013093][T26287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2065.026177][ T1433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2065.052021][T26312] bridge0: port 1(bridge_slave_0) entered blocking state [ 2065.059211][T26312] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:11 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005121201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:11 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x200000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(0x0, 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 2065.303717][T26318] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:12 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff050a05001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:12 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfcffffff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:12 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x300000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(0x0, 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2065.500457][T26347] __nla_validate_parse: 22 callbacks suppressed [ 2065.500475][T26347] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2065.518306][T26346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2065.561290][T26350] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:12 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x400000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(0x0, 0x0) lseek(r0, 0x0, 0x3) 19:59:12 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x500000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:12 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x600000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2066.053035][T26352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2066.072751][T26363] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2066.107400][T26363] bridge0: port 1(bridge_slave_0) entered blocking state [ 2066.114702][T26363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2066.167350][T26362] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2066.208315][T26367] bridge0: port 1(bridge_slave_0) entered disabled state [ 2066.371223][T26347] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2066.381812][T26347] bridge0: port 1(bridge_slave_0) entered blocking state [ 2066.389430][T26347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2066.407963][T26363] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 19:59:13 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005181201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(0x0, 0x0) lseek(r0, 0x0, 0x3) 19:59:13 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x700000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xefffffff00000000}, 0x0) [ 2066.427450][T26363] bridge0: port 1(bridge_slave_0) entered blocking state [ 2066.434688][T26363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2066.488379][T26366] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2066.508630][T26367] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:13 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff052905001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:13 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe800000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:13 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x800000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(0x0, 0x0) lseek(r0, 0x0, 0x3) [ 2066.805852][T26396] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2066.867995][T26400] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2066.918905][T26404] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:13 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x900000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 19:59:13 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xa00000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) [ 2067.134350][ T35] kauditd_printk_skb: 8 callbacks suppressed [ 2067.134365][ T35] audit: type=1804 audit(1611172753.981:169): pid=26429 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2360/bus/file0" dev="overlay" ino=16042 res=1 errno=0 [ 2067.406961][T26417] bridge0: port 1(bridge_slave_0) entered blocking state [ 2067.407550][ T35] audit: type=1804 audit(1611172754.251:170): pid=26436 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2361/bus/file0" dev="overlay" ino=15977 res=1 errno=0 [ 2067.414172][T26417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2067.467704][T26423] bridge0: port 1(bridge_slave_0) entered disabled state [ 2067.692486][T26400] bridge0: port 1(bridge_slave_0) entered blocking state [ 2067.699630][T26400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2067.713361][T21379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2067.732829][T26417] bridge0: port 1(bridge_slave_0) entered blocking state 19:59:14 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005211201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:14 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xc00000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 19:59:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) [ 2067.740020][T26417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2067.808121][T26423] bridge0: port 1(bridge_slave_0) entered disabled state [ 2067.910589][ T35] audit: type=1804 audit(1611172754.751:171): pid=26454 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2362/bus/file0" dev="overlay" ino=16088 res=1 errno=0 19:59:15 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff056405001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:15 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe80ffff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:15 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xf00000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x0) [ 2068.140147][T26461] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:15 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x1000000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x0) [ 2068.275799][ T35] audit: type=1804 audit(1611172755.121:172): pid=26471 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2363/bus/file0" dev="overlay" ino=16276 res=1 errno=0 19:59:15 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x131b000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2068.521202][ T35] audit: type=1804 audit(1611172755.361:173): pid=26487 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2364/bus/file0" dev="overlay" ino=16089 res=1 errno=0 [ 2068.557027][T26476] bridge0: port 1(bridge_slave_0) entered blocking state [ 2068.564235][T26476] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 2068.637041][T26480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2068.926446][T26456] bridge0: port 1(bridge_slave_0) entered blocking state [ 2068.934319][T26456] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:15 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005251201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:15 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x2000000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x0) 19:59:15 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2068.989259][T26476] bridge0: port 1(bridge_slave_0) entered blocking state [ 2068.996441][T26476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2069.050339][T26480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2069.149302][ T35] audit: type=1804 audit(1611172755.992:174): pid=26514 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2365/bus/file0" dev="overlay" ino=16074 res=1 errno=0 19:59:16 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff057305001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:16 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x6000000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 2069.352214][T26522] bridge0: port 1(bridge_slave_0) entered disabled state [ 2069.468535][ T35] audit: type=1804 audit(1611172756.312:175): pid=26532 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2366/bus/file0" dev="overlay" ino=16045 res=1 errno=0 19:59:16 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x6558000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) 19:59:16 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8000000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2069.794750][ T35] audit: type=1804 audit(1611172756.642:176): pid=26549 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2367/bus/file0" dev="overlay" ino=15806 res=1 errno=0 19:59:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x3) [ 2069.971642][T26538] bridge0: port 1(bridge_slave_0) entered blocking state [ 2069.978845][T26538] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:16 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005481201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:16 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8100000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:16 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880002, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2070.076253][ T35] audit: type=1804 audit(1611172756.922:177): pid=26556 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2368/bus/file0" dev="overlay" ino=15854 res=1 errno=0 19:59:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2070.278849][T26540] bridge0: port 1(bridge_slave_0) entered disabled state [ 2070.467309][ T35] audit: type=1804 audit(1611172757.312:178): pid=26576 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir279040213/syzkaller.rWwSM1/2369/bus/file0" dev="overlay" ino=16028 res=1 errno=0 [ 2070.530991][T26545] __nla_validate_parse: 21 callbacks suppressed [ 2070.531008][T26545] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2070.547598][T26567] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 19:59:17 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051002001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:17 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8847000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2070.592201][T26574] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2070.630310][T26574] bridge0: port 1(bridge_slave_0) entered blocking state 19:59:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) 19:59:17 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x8848000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2070.637623][T26574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2070.686873][T26578] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:17 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x88a8ffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:17 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x9effffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2071.175297][T26585] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2071.187355][T26591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:18 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510054c1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2071.216639][T26594] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2071.240906][T26594] bridge0: port 1(bridge_slave_0) entered blocking state [ 2071.250336][T26594] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:18 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880003, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:18 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xc3ffffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2071.330352][T26600] bridge0: port 1(bridge_slave_0) entered disabled state [ 2071.689613][T26625] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2071.699953][T26625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2071.707242][T26625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2071.727594][T26629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2071.757523][T26631] bridge0: port 1(bridge_slave_0) entered disabled state [ 2071.911885][T26598] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2071.925075][T26594] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2071.943335][T26594] bridge0: port 1(bridge_slave_0) entered blocking state [ 2071.950430][T26594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2071.968263][T26602] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:18 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051006001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:18 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xefffffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2072.078707][T26625] bridge0: port 1(bridge_slave_0) entered blocking state [ 2072.085914][T26625] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 19:59:19 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005601201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:19 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880004, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2072.248538][T26656] bridge0: port 1(bridge_slave_0) entered blocking state [ 2072.255921][T26656] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:19 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2072.304902][T26656] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:19 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xfcffffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:19 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xfeffffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3}, 0x0) [ 2072.719083][T26667] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:19 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051008001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:19 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffff000000000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2073.008740][T26658] bridge0: port 1(bridge_slave_0) entered blocking state [ 2073.015949][T26658] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:19 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005681201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:20 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880005, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2073.130285][T26703] bridge0: port 1(bridge_slave_0) entered blocking state [ 2073.137924][T26703] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:20 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 2073.180810][T26703] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:20 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:20 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0xffffffff00000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:20 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2073.658434][T26719] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:20 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051009001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2074.169946][T26746] bridge0: port 1(bridge_slave_0) entered blocking state [ 2074.177122][T26746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2074.218586][T26750] bridge0: port 1(bridge_slave_0) entered disabled state [ 2074.406226][T26710] bridge0: port 1(bridge_slave_0) entered blocking state [ 2074.413619][T26710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2074.441019][T26746] bridge0: port 1(bridge_slave_0) entered blocking state [ 2074.449497][T26746] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:21 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510056c1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 19:59:21 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880006, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:21 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2074.499583][T26750] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2074.757404][T26787] overlayfs: failed to resolve './file1': -2 19:59:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2074.934896][T26782] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:21 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051018001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2074.991435][T26796] overlayfs: failed to resolve './file1': -2 19:59:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2075.163541][T26782] bridge0: port 1(bridge_slave_0) entered blocking state [ 2075.170753][T26782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2075.221070][T26800] bridge0: port 1(bridge_slave_0) entered blocking state [ 2075.228277][T26800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2075.237561][T26803] overlayfs: failed to resolve './file1': -2 19:59:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6}, 0x0) 19:59:22 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2075.286054][T26801] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:22 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2075.438480][T26814] overlayfs: failed to resolve './file0': -2 [ 2075.582819][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2075.595848][T26778] __nla_validate_parse: 26 callbacks suppressed [ 2075.595867][T26778] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2075.614410][T26782] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:22 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:22 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005741201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:22 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880007, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2075.798608][T26809] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2075.836621][T26800] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2075.877960][T26800] bridge0: port 1(bridge_slave_0) entered blocking state [ 2075.885181][T26800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2075.936294][T26827] overlayfs: failed to resolve './file0': -2 [ 2075.957589][T26801] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:22 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2076.214315][T26815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2076.241398][T26831] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 19:59:23 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x7}, 0x0) 19:59:23 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff05101c001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:23 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2076.272732][T26839] overlayfs: failed to resolve './file0': -2 [ 2076.279303][T26831] bridge0: port 1(bridge_slave_0) entered blocking state [ 2076.286492][T26831] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:23 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2076.343898][T26829] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2076.408714][T26834] bridge0: port 1(bridge_slave_0) entered disabled state [ 2076.463965][T26850] overlayfs: failed to resolve './file0': -2 19:59:23 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:23 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2076.755771][T26862] overlayfs: failed to resolve './file0': -2 [ 2076.835501][T26845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2076.892375][T26849] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2076.901219][T26868] overlayfs: failed to resolve './file0': -2 [ 2076.912263][T26849] bridge0: port 1(bridge_slave_0) entered blocking state [ 2076.919564][T26849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2077.020020][T26855] bridge0: port 1(bridge_slave_0) entered disabled state [ 2077.100417][T26875] overlayfs: failed to resolve './file1': -2 19:59:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2077.275209][T26878] overlayfs: failed to resolve './file1': -2 [ 2077.419624][T26884] overlayfs: failed to resolve './file1': -2 [ 2077.426124][T26831] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2077.439842][T26831] bridge0: port 1(bridge_slave_0) entered blocking state [ 2077.447096][T26831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2077.473592][T26864] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2077.489066][T26865] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:24 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510057a1201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:24 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880008, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2077.711263][T26849] bridge0: port 1(bridge_slave_0) entered blocking state [ 2077.718403][T26849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2077.740109][T26858] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8}, 0x0) 19:59:24 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051002781201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:24 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2078.002523][T26897] bridge0: port 1(bridge_slave_0) entered blocking state [ 2078.009791][T26897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2078.071917][T26902] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2078.455916][T26917] bridge0: port 1(bridge_slave_0) entered blocking state [ 2078.463173][T26917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2078.503503][T26920] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(0x0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:25 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x6}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2078.792479][T26917] bridge0: port 1(bridge_slave_0) entered blocking state [ 2078.799731][T26917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2078.821182][T26897] bridge0: port 1(bridge_slave_0) entered blocking state [ 2078.828371][T26897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2078.892331][T26917] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:25 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005831201", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:25 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880009, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9}, 0x0) 19:59:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:26 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005040001", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2079.258797][T19459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2079.297508][T26957] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:26 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x7}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2079.665324][T26972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2079.672497][T26972] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2079.732285][T26975] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2080.059208][T26950] bridge0: port 1(bridge_slave_0) entered blocking state [ 2080.066375][T26950] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:26 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005002001", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa}, 0x0) [ 2080.132155][T26972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2080.139290][T26972] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:27 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe88000a, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:27 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x8}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2080.236396][T26975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2080.417226][T27015] overlayfs: missing 'lowerdir' 19:59:27 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005021201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2080.626959][T27003] __nla_validate_parse: 18 callbacks suppressed [ 2080.626979][T27003] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2080.658790][T27004] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2080.676767][T27006] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2080.719537][T27011] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2080.772332][T27028] overlayfs: missing 'lowerdir' [ 2080.916277][T27036] overlayfs: missing 'lowerdir' 19:59:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2081.093920][T27039] overlayfs: missing 'lowerdir' [ 2081.103884][T27031] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2081.121228][T27031] bridge0: port 1(bridge_slave_0) entered blocking state [ 2081.129051][T27031] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:28 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x9}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2081.315680][T27049] overlayfs: missing 'lowerdir' [ 2081.389070][T27032] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2081.552625][T27055] overlayfs: missing 'lowerdir' [ 2081.692157][T27004] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2081.703176][T27004] bridge0: port 1(bridge_slave_0) entered blocking state [ 2081.710557][T27004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2081.741548][T27010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2081.752386][T27045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2081.778022][T27031] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 19:59:28 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005004001", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2081.800741][T27031] bridge0: port 1(bridge_slave_0) entered blocking state [ 2081.807885][T27031] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:28 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe88000b, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xb}, 0x0) [ 2081.859008][T27037] bridge0: port 1(bridge_slave_0) entered disabled state [ 2081.867123][T27063] overlayfs: missing 'lowerdir' 19:59:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2082.043507][T27077] overlayfs: missing 'lowerdir' [ 2082.156809][T27066] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2082.174960][T27069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:29 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005031201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:29 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2082.245003][T27073] bridge0: port 1(bridge_slave_0) entered disabled state [ 2082.355707][T27089] overlayfs: missing 'lowerdir' 19:59:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2082.441591][T27095] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 2082.466269][T27095] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 19:59:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2082.612632][T27102] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 2082.621530][T27102] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 19:59:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2082.745745][T27092] bridge0: port 1(bridge_slave_0) entered blocking state [ 2082.753166][T27092] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc}, 0x0) [ 2082.808973][T27096] bridge0: port 1(bridge_slave_0) entered disabled state [ 2082.867322][T27109] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 2082.950205][T27109] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 2083.128223][T27066] bridge0: port 1(bridge_slave_0) entered blocking state [ 2083.135844][T27066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2083.160756][T27078] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:30 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001202", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:30 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880010, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:30 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xc}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2083.342157][T27092] bridge0: port 1(bridge_slave_0) entered blocking state [ 2083.349446][T27092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2083.441076][T27125] overlayfs: unrecognized mount option "upper" or missing value [ 2083.543512][T27096] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2083.740238][T27141] overlayfs: unrecognized mount option "upper" or missing value [ 2083.841294][T27137] bridge0: port 1(bridge_slave_0) entered blocking state [ 2083.848941][T27137] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:30 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005041201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf}, 0x0) [ 2083.898502][T27143] bridge0: port 1(bridge_slave_0) entered disabled state [ 2083.976899][T27152] overlayfs: unrecognized mount option "upper" or missing value 19:59:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2084.118621][T27162] overlayfs: workdir and upperdir must be separate subtrees [ 2084.307896][T27168] overlayfs: workdir and upperdir must be separate subtrees [ 2084.351556][T27157] bridge0: port 1(bridge_slave_0) entered blocking state [ 2084.358956][T27157] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:31 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880011, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:31 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xf}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2084.398030][T27159] bridge0: port 1(bridge_slave_0) entered disabled state [ 2084.748476][T27137] bridge0: port 1(bridge_slave_0) entered blocking state [ 2084.756076][T27137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2084.796848][T27157] bridge0: port 1(bridge_slave_0) entered blocking state [ 2084.804159][T27157] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:31 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001203", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 19:59:31 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005051201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:31 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880200, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:31 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2084.972020][T27191] overlayfs: workdir and upperdir must be separate subtrees [ 2085.028732][T27198] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2085.287269][T27218] overlayfs: failed to resolve './fil': -2 19:59:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2085.381241][T27211] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11}, 0x0) 19:59:32 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x60}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2085.566238][T27227] overlayfs: failed to resolve './fil': -2 19:59:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2085.629811][T27207] __nla_validate_parse: 23 callbacks suppressed [ 2085.629828][T27207] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2085.657038][T27207] bridge0: port 1(bridge_slave_0) entered blocking state [ 2085.664561][T27207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2085.705375][T27198] bridge0: port 1(bridge_slave_0) entered disabled state [ 2085.787938][T27239] overlayfs: failed to resolve './fil': -2 19:59:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2085.950056][T27243] overlayfs: failed to resolve './file': -2 [ 2086.005035][T27229] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2086.077259][T27208] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2086.098644][T27202] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2086.179618][T27202] bridge0: port 1(bridge_slave_0) entered blocking state [ 2086.187120][T27202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2086.214474][T27237] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:33 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001204", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:33 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005061201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:33 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x300}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:33 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880300, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x60}, 0x0) [ 2086.330392][T27232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2086.476946][T27259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2086.496446][T27258] overlayfs: failed to resolve './file': -2 19:59:33 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x500}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2086.531799][T27265] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2086.552114][T27265] bridge0: port 1(bridge_slave_0) entered blocking state [ 2086.559457][T27265] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2086.621420][T27268] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2086.663609][T27267] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2086.684100][T27267] bridge0: port 1(bridge_slave_0) entered blocking state [ 2086.691401][T27267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2086.693969][T27283] overlayfs: failed to resolve './file': -2 [ 2086.757153][T27273] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) 19:59:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) [ 2087.161512][ T6230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2087.187441][T27275] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(0x0, 0x0) 19:59:34 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001205", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(0x0, 0x0) [ 2087.492688][T27286] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2087.519642][T27273] bridge0: port 1(bridge_slave_0) entered blocking state [ 2087.526774][T27273] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:34 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005071201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:34 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880400, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:34 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x300}, 0x0) 19:59:34 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x700}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2087.940978][T27327] bridge0: port 1(bridge_slave_0) entered blocking state [ 2087.948203][T27327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2087.970659][T27318] overlayfs: failed to resolve './bus': -2 [ 2088.001538][T27325] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000380)='./bus\x00') creat(0x0, 0x0) 19:59:35 executing program 4: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x400) 19:59:35 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e3, &(0x7f0000000040)='o') [ 2088.376052][T27335] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:35 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000100)={0x0, 0x0}) [ 2088.701666][T27327] bridge0: port 1(bridge_slave_0) entered blocking state [ 2088.711220][T27327] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:35 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880500, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:35 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001206", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:35 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005081201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:35 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x900}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 2088.921644][T27367] bridge0: port 1(bridge_slave_0) entered blocking state [ 2088.928914][T27367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2089.055383][T27367] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:36 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:36 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880600, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2089.260586][T27387] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 19:59:36 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 19:59:36 executing program 4: prctl$PR_GET_PDEATHSIG(0x1c, 0x0) 19:59:36 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions='default_permissions'}], [{@fowner_lt={'fowner<', 0xee01}}]}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000001800)={0x0, 0x0, "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", "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"}) syz_mount_image$ext4(&(0x7f0000002980)='ext3\x00', &(0x7f00000029c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002a80)={[{@dax='dax'}]}) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) 19:59:36 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005091201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2089.768355][T27386] bridge0: port 1(bridge_slave_0) entered blocking state [ 2089.775577][T27386] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6ca, &(0x7f0000000040)=0x4, 0x4) [ 2089.887881][T27424] bridge0: port 1(bridge_slave_0) entered blocking state [ 2089.895159][T27424] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:36 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001207", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:36 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880700, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x700}, 0x0) 19:59:36 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xc00}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2089.945146][T27424] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040), 0x4) 19:59:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000001440), 0x0, 0x0) 19:59:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000002180)={&(0x7f0000002b80)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x464, 0x8, 0x0, 0x1, [{0x44, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @remote}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x571, @empty, 0x6}}]}, {0xe0, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "68a4581b8b6aecdb2a14c0e2da6e50ed33d59a25ce54376b64eb0d4fdf2256fd"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "56d3f74d33d2c3020e98fd4be4fccc78d2df1ea2c0fed91af34c69d80b22c983"}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @local}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}]}, {0x230, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xbc, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x33}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x120, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "26fc496dfac1a4f0726415a393f7e53a59768f568ae5e81cbadc69ee2306ede3"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880800, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:37 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xf00}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2090.542355][T27440] bridge0: port 1(bridge_slave_0) entered blocking state [ 2090.549515][T27440] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6c2, &(0x7f0000000040), 0x4) 19:59:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x900}, 0x0) 19:59:37 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001208", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2090.696426][T27474] __nla_validate_parse: 27 callbacks suppressed [ 2090.696444][T27474] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2090.780206][T27474] bridge0: port 1(bridge_slave_0) entered blocking state [ 2090.787466][T27474] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:37 executing program 4: r0 = openat$nvram(0xffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x408100, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x288820, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8001}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@fowner_gt={'fowner>', r2}}, {@fowner_lt={'fowner<', 0xee01}}]}}) r3 = syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x3, 0x2, &(0x7f0000001440)=[{&(0x7f0000000380)="4c4e8561074a3a7ede28ea904713eb5f5eb14a7fc26346b73dacfb1ed130307eab4d5266735f901accb9d78488231dc0d0c5a31dfd46b6604fecf2080ef52a29a274115a4259cdccc9ddee41fe4a564487a37943d75c8b6d6c47b863131803b25e7a5277321e7ac7e0aebe5b6101141470c777399fd877448b5cb111b716e8b4135ec653f636455332a3c07cfad6462d9d7355c69ae19b9647860da1edf96322a0b7494cc38398d75f792e65b976937e39bae28f7e826b0b583f", 0xba, 0x2}, {&(0x7f0000000440)="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", 0x1000, 0x6}], 0x1000, &(0x7f0000001480)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@obj_user={'obj_user', 0x3d, 'user_id'}}, {@euid_lt={'euid<', r1}}, {@hash='hash'}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81e8943c, &(0x7f0000001500)) r4 = geteuid() quotactl(0x1, &(0x7f0000001700)='./file0/file0\x00', r4, &(0x7f0000001740)="e26696f883aa8421e2a8330a47c66a79174e2d50dd0ff30d19283c361e286443fa3c176aefa2c2b69a58ecea19661dc2b84de02705bb1257c6c8b333050771801ad1ee1f03fcfb1ada3a02e0ee74ebc2fb1bf4d5c53a15ffd603cf96a975a43ab732556c5b91ea7cf86ce667850007b4d3cde3329b43e3269c8dd61c9eb5a476a1f4864a4cceb29707a3b196") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000002880)="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", 0xfe) syz_mount_image$ext4(&(0x7f0000002980)='ext3\x00', &(0x7f00000029c0)='./file0/file0\x00', 0x1, 0x1, &(0x7f0000002a40)=[{&(0x7f0000002a00)="ef88c6e21dc53bf2a0996c595f45091bdb5f0860f1116a943be6469cb79ab49b6ef3ddaef49fe9329fa58eec13ed6751f253c1485c7e0bcd", 0x38, 0xffff0001}], 0x882, &(0x7f0000002a80)={[{@dax='dax'}], [{@uid_eq={'uid', 0x3d, r4}}]}) mkdirat(r3, &(0x7f0000002b00)='./file0\x00', 0x1a9) syz_mount_image$tmpfs(&(0x7f0000002b40)='tmpfs\x00', &(0x7f0000002b80)='./file0\x00', 0x0, 0x6, &(0x7f0000002f00)=[{&(0x7f0000002bc0)="40a6ddae3e31349201cf6509846aba5a2d2404dd2f77958984af32c3befb33c59eaa2d0c53ef05629ce03257658e9a347eb28f27e70eded286e91016e75ae9015b60246aea252fce294d17e1f5f94820ac7c846e90bcd068b7c618bf244b73270b30b5833d3316c30ed65e95981793db39406fe41e9227a1d72a006118c248a7fd2d64a2c6eef56d3b51d5e4ba60ec94c0a60f8d0452ee036d8aef14bae215b848fa6add9ccb08e7ecc2435c6b69cdad017a7fb335fa13b5ac1747d76f21b817930e", 0xc2}, {&(0x7f0000002cc0)="057d14bc7948c052f69a0c94fb964ba419db29f0b35f69fb6bb66a096c472f7403d7df6066533fd447b593f267d0af50666fe40effe27387635afb703143bbe9aae6bab3d95f6e49478d4f79731bd3ef5ba69637d7e6c2c3540315b23bed5e4eaa3574f10ce46df8cf9138607be9b3eb77170d7ccd7cd7a6b4c103b1", 0x7c}, {&(0x7f0000002d40)="7ebc75b2b82301804d272d747e0a9a9645dc4c93b3f8ce7a09a7c340984ecc86bccb35f982", 0x25, 0x9}, {&(0x7f0000002d80)="575982e4cb153d976407bf426794047142a0cdea09e1256c33c84cce74c245d5b0b871f2e3480a7c3bd7481726504fdbf9e110fb4118c70bd6944c036c8ff27b4bf32fafcac6b67254cf676c14f12063b3cf291808a4781f8126afd78917ba1883b057f6b4f2dfccab3a8a825e91802c1b4474a8c57a7684112fad3e09e82f69135cca18aa8e6708f90e87b3c1288239ca438c29ff2bd95cab684d093feb4f96f60312ce2cf43a5b4da06553d61823044a8327be57fbe27edd658cdf8db2dc3d01b9216f4fc819013a842b212491945002db9c250b506332b9c4945f68ee003e7b8da84fcc5b6bb4e4edb6034fb230b1de3964c7ba4ab97c0a48", 0xfa, 0x3}, {&(0x7f0000002e80)="cb136b30e9d789e988918f09db01ee89f18e00975a3d24a543d9462c77abeccc2ca2294a2d4b10916297761c8ca43acff8d91d6e67b69b390b3f00", 0x3b, 0x800}, {&(0x7f0000002ec0)="f79c053fed585adaca248a93dfcf69f03aaad4047b703e9714533825fb7627466d473f0e7794eb295efb7479", 0x2c, 0x5}], 0x400, &(0x7f0000002f80)={[{@nr_blocks={'nr_blocks'}}, {@huge_never='huge=never'}, {@huge_within_size='huge=within_size'}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@huge_advise='huge=advise'}]}) kexec_load(0x2, 0x1, &(0x7f0000004000)=[{&(0x7f0000003000)="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", 0x1000, 0x6, 0x2}], 0x500001) lremovexattr(&(0x7f0000004040)='./file0/file0\x00', &(0x7f0000004080)=@known='system.advise\x00') sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000004340)={&(0x7f00000040c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000004300)={&(0x7f0000004180)={0x16c, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40000}, 0x24008000) syz_genetlink_get_family_id$ethtool(&(0x7f00000043c0)='ethtool\x00') [ 2090.828679][T27477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2090.877806][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2090.891671][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2090.945705][T27480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2090.954473][T27495] loop4: detected capacity change from 8 to 0 [ 2091.029697][T27495] loop4: detected capacity change from 264192 to 0 [ 2091.057795][T27495] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2091.177619][T27484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2091.281098][T27486] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2091.313844][T27490] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:38 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x131b}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2091.605489][T27495] loop4: detected capacity change from 32744 to 0 [ 2091.614300][T27486] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2091.639429][T27506] tmpfs: Unknown parameter 'fd' [ 2091.655466][T27486] bridge0: port 1(bridge_slave_0) entered blocking state [ 2091.662955][T27486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2091.683717][T27474] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2091.695063][T27474] bridge0: port 1(bridge_slave_0) entered blocking state [ 2091.702310][T27474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2091.739485][T27506] loop4: detected capacity change from 264192 to 0 [ 2091.762543][T27506] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2091.788118][T27480] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0xffffffff, 0x4) 19:59:38 executing program 4: socketpair(0xa, 0x2, 0x0, &(0x7f0000000100)) 19:59:39 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050b1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2092.129464][T27511] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2092.163225][T27488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:39 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880900, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 19:59:39 executing program 4: syz_mount_image$romfs(&(0x7f0000000040)='romfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) [ 2092.363223][T27498] bridge0: port 1(bridge_slave_0) entered disabled state [ 2092.428382][T27539] MTD: Attempt to mount non-MTD device "/dev/loop4" [ 2092.463558][T27539] VFS: Can't find a romfs filesystem on dev loop4. [ 2092.463558][T27539] [ 2092.544791][T27540] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2092.566083][T27540] bridge0: port 1(bridge_slave_0) entered blocking state [ 2092.573502][T27540] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:39 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x1b13}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:39 executing program 4: syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffff, 0x0) 19:59:39 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff05100500120a", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2092.662750][T27543] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2092.761011][T27548] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:39 executing program 4: capset(&(0x7f0000000680)={0x20080522}, &(0x7f0000000240)) 19:59:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x4, 0x4) 19:59:40 executing program 4: prctl$PR_GET_PDEATHSIG(0x17, 0x0) 19:59:40 executing program 4: prctl$PR_GET_PDEATHSIG(0x4, 0x0) [ 2093.357673][T27564] bridge0: port 1(bridge_slave_0) entered blocking state [ 2093.364877][T27564] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000004c0)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL]}, 0x24}}, 0x0) [ 2093.414300][T27569] bridge0: port 1(bridge_slave_0) entered disabled state [ 2093.696573][T27540] bridge0: port 1(bridge_slave_0) entered blocking state [ 2093.703785][T27540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2093.724461][T27552] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:40 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050c1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:40 executing program 4: prctl$PR_GET_PDEATHSIG(0x16, 0x0) 19:59:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xb00}, 0x0) 19:59:40 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880a00, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2093.858784][T27564] bridge0: port 1(bridge_slave_0) entered blocking state [ 2093.867188][T27564] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:40 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x2000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:40 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) [ 2093.955850][T27601] bridge0: port 1(bridge_slave_0) entered disabled state [ 2094.221832][T27610] bridge0: port 1(bridge_slave_0) entered blocking state [ 2094.229707][T27610] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:41 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff05100500120c", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:41 executing program 4: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x4, [{0x4, &(0x7f0000000180)=@lang_id={0x4}}, {0x0, 0x0}, {0x4, &(0x7f0000000240)=@string={0x4, 0x3, "5dc8"}}, {0x0, 0x0}]}) [ 2094.276334][T27619] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:41 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe880b00, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2094.548862][T27637] bridge0: port 1(bridge_slave_0) entered blocking state [ 2094.556091][T27637] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 19:59:41 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x4788}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2094.610930][T27641] bridge0: port 1(bridge_slave_0) entered disabled state [ 2094.780541][T28789] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 2094.848877][T27610] bridge0: port 1(bridge_slave_0) entered blocking state [ 2094.856069][T27610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2094.876222][T27622] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:41 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050d1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2095.032822][T27637] bridge0: port 1(bridge_slave_0) entered blocking state [ 2095.040257][T27637] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:41 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x4888}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:42 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe881000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2095.089025][T28789] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 2095.103798][T28789] usb usb5-port1: attempt power cycle 19:59:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 19:59:42 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001218", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2095.154748][T27666] bridge0: port 1(bridge_slave_0) entered blocking state [ 2095.161998][T27666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2095.241220][T27666] bridge0: port 1(bridge_slave_0) entered disabled state [ 2095.513358][T27674] bridge0: port 1(bridge_slave_0) entered blocking state [ 2095.520529][T27674] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:42 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2095.563041][T27666] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:42 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050e1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2095.702947][T27683] __nla_validate_parse: 24 callbacks suppressed [ 2095.702968][T27683] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2095.756572][T27685] bridge0: port 1(bridge_slave_0) entered disabled state [ 2095.778660][T28789] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? 19:59:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1100}, 0x0) [ 2095.971083][T27682] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2095.982454][T27698] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2096.000040][T27699] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2096.027463][T27699] bridge0: port 1(bridge_slave_0) entered blocking state [ 2096.034731][T27699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2096.081286][T27700] bridge0: port 1(bridge_slave_0) entered disabled state [ 2096.088858][T28789] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 2096.109087][T28789] usb usb5-port1: unable to enumerate USB device [ 2096.281872][T27685] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2096.291496][T27685] bridge0: port 1(bridge_slave_0) entered blocking state [ 2096.300025][T27685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2096.318456][T27704] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2096.363197][T27699] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2096.390647][T27699] bridge0: port 1(bridge_slave_0) entered blocking state [ 2096.397931][T27699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2096.436197][T27706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2096.968414][ T1433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2096.976484][ T1433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:59:44 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:59:44 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001225", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:44 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x6000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:44 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfe881100, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:44 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050f1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4788}, 0x0) [ 2097.399242][T27722] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 19:59:44 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x8000000) [ 2097.442211][T27724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2097.537213][T27722] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:44 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x6558}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:44 executing program 4: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:59:44 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) accept$inet6(r0, 0x0, 0x0) 19:59:44 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 19:59:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x16}, 0x40) 19:59:45 executing program 4: syz_open_dev$vcsu(&(0x7f0000001780)='/dev/vcsu#\x00', 0x3f, 0x0) [ 2098.431337][T27733] bridge0: port 1(bridge_slave_0) entered disabled state [ 2098.808961][T27760] bridge0: port 1(bridge_slave_0) entered blocking state [ 2098.816208][T27760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2098.886773][T27762] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:46 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001229", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:46 executing program 4: syz_usb_connect$uac1(0x0, 0x76, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x64, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5, 0x24, 0x5, 0x0, 0x3}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 19:59:46 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005101201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:46 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfec0ffff, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4888}, 0x0) 19:59:46 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x8100}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2099.398900][T27784] bridge0: port 1(bridge_slave_0) entered blocking state [ 2099.406100][T27784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2099.468996][T27791] bridge0: port 1(bridge_slave_0) entered blocking state [ 2099.476222][T27791] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:46 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x8847}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2099.535353][T27794] bridge0: port 1(bridge_slave_0) entered disabled state [ 2099.748036][ T1433] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 2099.858035][T27797] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:46 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xff000000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2100.040828][T27784] bridge0: port 1(bridge_slave_0) entered blocking state [ 2100.048001][T27784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2100.057280][ T1433] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 2100.090865][ T1433] usb usb5-port1: attempt power cycle [ 2100.093865][T27794] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 2100.264620][T27791] bridge0: port 1(bridge_slave_0) entered blocking state [ 2100.271804][T27791] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:47 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005111201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:47 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x8848}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:47 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001237", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2100.377320][T27822] bridge0: port 1(bridge_slave_0) entered blocking state [ 2100.384603][T27822] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:47 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xffba9964, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2100.474622][T27822] bridge0: port 1(bridge_slave_0) entered disabled state [ 2100.748509][ T1433] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 2100.792177][T27831] __nla_validate_parse: 17 callbacks suppressed [ 2100.792203][T27831] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2100.834728][T27835] bridge0: port 1(bridge_slave_0) entered disabled state [ 2101.024030][T27837] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2101.049048][T27843] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2101.059001][ T1433] usb usb5-port1: Cannot enable. Maybe the USB cable is bad? [ 2101.086913][ T1433] usb usb5-port1: unable to enumerate USB device [ 2101.097967][T27831] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2101.118857][T27831] bridge0: port 1(bridge_slave_0) entered blocking state [ 2101.126012][T27831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2101.154563][T27851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2102.148025][ T2631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:59:49 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8d2202, 0x0) 19:59:49 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:49 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005121201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 19:59:49 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001218", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:49 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xffff80fe, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2102.337797][T27863] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2102.385530][T27867] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2102.413120][T27864] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 19:59:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) [ 2102.435835][T27864] bridge0: port 1(bridge_slave_0) entered blocking state [ 2102.443417][T27864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2102.506379][T27874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 19:59:49 executing program 4: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0)='NLBL_CIPSOv4\x00') 19:59:49 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2102.562263][T27867] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:49 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 19:59:49 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x881, 0x0) 19:59:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2103.136634][T27876] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:50 executing program 4: syz_open_dev$vcsu(&(0x7f0000002500)='/dev/vcsu#\x00', 0x0, 0x214000) 19:59:50 executing program 4: socketpair(0xa, 0x0, 0xffffffff, &(0x7f0000000000)) [ 2103.416867][T27873] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:50 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005181201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:50 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 19:59:50 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001206", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:50 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:59:50 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xffffc0fe, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:50 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2103.634282][T27921] bridge0: port 1(bridge_slave_0) entered blocking state [ 2103.641552][T27921] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:50 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) connect$can_j1939(r0, 0x0, 0x0) [ 2103.686165][T27925] bridge0: port 1(bridge_slave_0) entered blocking state [ 2103.693412][T27925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2103.798396][T27921] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:50 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, 0x0, 0x0) 19:59:50 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 19:59:51 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) [ 2104.232562][T27932] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:51 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x3e9, 0x0, 0x0, 0x25dfdbff, {0x0, 0x1}, [""]}, 0x38}}, 0x0) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) 19:59:51 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') clock_gettime(0x0, &(0x7f0000000300)) 19:59:51 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) [ 2104.587637][T27925] bridge0: port 1(bridge_slave_0) entered blocking state [ 2104.594846][T27925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2104.649323][T27968] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:51 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 19:59:51 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff05100500120a", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:51 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005211201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:51 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:51 executing program 4: socket(0x29, 0x2, 0xfffeffff) 19:59:51 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xffffff7f, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:51 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8847}, 0x0) [ 2104.988506][T27991] bridge0: port 1(bridge_slave_0) entered blocking state [ 2104.995810][T27991] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:51 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000001840)='net/rfcomm\x00') [ 2105.054065][T27993] bridge0: port 1(bridge_slave_0) entered blocking state [ 2105.061513][T27993] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x100010, r0, 0x8000000) [ 2105.138063][T27991] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:52 executing program 4: setsockopt$SO_J1939_PROMISC(0xffffffffffffffff, 0x6b, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') 19:59:52 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) 19:59:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20c0c1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x8000000) [ 2105.604832][T27999] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x8001) [ 2105.957231][T27995] __nla_validate_parse: 14 callbacks suppressed [ 2105.957252][T27995] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2105.991706][T27993] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 19:59:52 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x400) 19:59:52 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005251201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:52 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001224", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:52 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xffffff9e, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2106.020448][T27993] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.027738][T27993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2106.049019][T28029] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:52 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8848}, 0x0) 19:59:53 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0x0) [ 2106.199631][T28042] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2106.240661][T28042] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.247990][T28042] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:53 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x8000000) [ 2106.296649][T28043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2106.345400][T28045] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2106.377603][T28050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:53 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:53 executing program 4: syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x440) [ 2106.435682][T28051] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:53 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2a4000, 0x0) 19:59:53 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x121cc0, 0x0) 19:59:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x25002040}, 0xc, &(0x7f0000000280)={0x0}}, 0x0) 19:59:53 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) [ 2106.958825][T28053] bridge0: port 1(bridge_slave_0) entered disabled state [ 2107.201298][T28042] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2107.212975][T28042] bridge0: port 1(bridge_slave_0) entered blocking state [ 2107.220164][T28042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2107.229877][T21379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2107.247058][T28085] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2107.268500][T28051] bridge0: port 1(bridge_slave_0) entered disabled state [ 2107.492219][T28090] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:59:54 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005481201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:54 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 19:59:54 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001236", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:54 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xffffffe0, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 19:59:54 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2107.639948][T28104] bridge0: port 1(bridge_slave_0) entered blocking state [ 2107.647208][T28104] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:54 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) write$FUSE_DIRENT(r1, &(0x7f00000004c0)=ANY=[], 0xc8) dup3(r3, r1, 0x0) [ 2107.745708][T28104] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:54 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:54 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) 19:59:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 19:59:55 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 19:59:55 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x69) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7fffffff}, 0x1c, 0x0}, 0x0) [ 2108.235252][T28124] bridge0: port 1(bridge_slave_0) entered blocking state [ 2108.243822][T28124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2108.355765][T28130] bridge0: port 1(bridge_slave_0) entered disabled state [ 2108.634973][T28124] bridge0: port 1(bridge_slave_0) entered blocking state [ 2108.642389][T28124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2108.691359][T28124] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:55 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510054c1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:55 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xffffffef, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:55 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 19:59:55 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001239", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:55 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:55 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000540), 0x4) 19:59:55 executing program 4: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000002640)={0x0, 0x0, &(0x7f00000026c0)={0x0}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) preadv(r3, &(0x7f00000012c0), 0x1000000000000147, 0x0, 0x0) [ 2108.913397][T28158] bridge0: port 1(bridge_slave_0) entered blocking state [ 2108.920621][T28158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2109.005652][T28163] bridge0: port 1(bridge_slave_0) entered blocking state [ 2109.012954][T28163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2109.062616][T28168] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:56 executing program 4: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000002640)={0x0, 0x0, &(0x7f00000026c0)={0x0}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) preadv(r3, &(0x7f00000012c0), 0x1000000000000147, 0x0, 0x0) [ 2109.286976][T28158] bridge0: port 1(bridge_slave_0) entered blocking state [ 2109.294090][T28158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2109.351740][T28171] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:56 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001200", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:56 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x9000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 19:59:56 executing program 4: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000002640)={0x0, 0x0, &(0x7f00000026c0)={0x0}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) preadv(r3, &(0x7f00000012c0), 0x1000000000000147, 0x0, 0x0) [ 2109.707405][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2109.740552][T28192] bridge0: port 1(bridge_slave_0) entered disabled state [ 2110.084051][T28163] bridge0: port 1(bridge_slave_0) entered blocking state [ 2110.091258][T28163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2110.137988][T28187] bridge0: port 1(bridge_slave_0) entered blocking state [ 2110.145251][T28187] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:57 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005601201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 19:59:57 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfffffff0, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 19:59:57 executing program 4: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000002640)={0x0, 0x0, &(0x7f00000026c0)={0x0}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) preadv(r3, &(0x7f00000012c0), 0x1000000000000147, 0x0, 0x0) 19:59:57 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 19:59:57 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050012f2", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0xffffffd8) [ 2110.494143][T28228] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x90020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xffffffd8) 19:59:57 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0xfffffffc, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2110.823878][T28243] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:57 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2111.300037][T28233] __nla_validate_parse: 24 callbacks suppressed [ 2111.300055][T28233] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2111.364184][T28233] bridge0: port 1(bridge_slave_0) entered blocking state [ 2111.371472][T28233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2111.432409][T28228] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x90020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xffffffd8) 19:59:58 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005681201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2111.720830][T28260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2111.798443][T28242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2111.826934][T28240] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2111.854154][T28240] bridge0: port 1(bridge_slave_0) entered blocking state [ 2111.861385][T28240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2111.949740][T28247] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x90020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xffffffd8) [ 2112.278735][T28260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2112.301951][T28277] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 19:59:59 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 19:59:59 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 2112.342596][T28277] bridge0: port 1(bridge_slave_0) entered blocking state [ 2112.350011][T28277] bridge0: port 1(bridge_slave_0) entered forwarding state 19:59:59 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050012f8", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:59:59 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0x2, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2112.799171][T28278] bridge0: port 1(bridge_slave_0) entered disabled state 19:59:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x90020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xe, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xffffffd8) [ 2113.197395][T28288] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2113.277682][T28298] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2113.338360][T28300] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2113.350534][T28300] bridge0: port 1(bridge_slave_0) entered blocking state [ 2113.357766][T28300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2113.380277][T28302] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 20:00:00 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510056c1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:00 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2113.391864][T28305] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:00 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x0) 20:00:00 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040)={0x0, 0x0, 0xfffffffd}, 0x10, 0xffffffffffffffff}, 0x78) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0xb2}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:00:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x80045440, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000ffed00"}) [ 2113.915076][T28331] ptrace attach of "/root/syz-executor.4"[28330] was attempted by "/root/syz-executor.4"[28331] [ 2113.917796][T28291] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:00 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0x8, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2113.975381][T28317] bridge0: port 1(bridge_slave_0) entered blocking state [ 2113.982683][T28317] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 2114.041280][T28319] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x131b0000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2114.361766][T28300] bridge0: port 1(bridge_slave_0) entered blocking state [ 2114.370034][T28300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2114.406863][T28323] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:01 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050012f9", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2114.550649][T28317] bridge0: port 1(bridge_slave_0) entered blocking state [ 2114.557996][T28317] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f0000000600)=@framed, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:00:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 20:00:01 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:01 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005741201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:01 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0x83, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2114.713824][T28360] bridge0: port 1(bridge_slave_0) entered blocking state [ 2114.721560][T28360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2114.824829][T28366] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:01 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0xfffffffd) syz_mount_image$vfat(0x0, &(0x7f0000000400)='./file0\x00', 0x100000000000, 0x6, &(0x7f0000001880)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="cf24803f94247cbe0246535a8328ac2ffdd737fd5040043838e6e930bd1c8dbb07d7383f9374dbfd373bdb9716385770d255f8972398e02471d3512bbbfd58cc3888e7b86d35bfa103663214c952b7979168b6cb6e77035558d6cda02adbfa8973ad594312a65160a50955ca41143ec3507c3d01e0ded1cc74f9a5ab8b782398518308684513a505efc08460796b6a92661ab460db5bbd4b56f12da7d1615a922d6f665e6659a54645a1fc37075d", 0xae, 0x8}, {&(0x7f0000001500)="544b47fb3e4272b63e3fc31200a82accebf4854e15c22b4f21dd6c45a3f6390bbdefdbe95c6b19d05cf41e182b6fb73c6e874f5b4fa3856c25eb2b5ea08ef583950a3f9e4e74522be7e77c9b8dd5430fe04766b8c3bfcc6878c93ec2fa0fba412f253e4828f96aef1b42467580b998274a77443a8557a27826058121597d6bb0550f128065dfd1c12ca60adf80ac853e3081270c62a4b27dc1b06f0812274d08104438a45a7aa6342e7b4a", 0xab, 0xfffffffffffffffa}, {&(0x7f00000015c0)="1b03816cfca58f1254d50c9a49aa2d51190bb6f0012a6365c508cc10eaf2aef410bbdd737ea89a95c07413d9265eaeb4ebfee18127fe4041f1ea13773659e1c6d8b3d2dcb30a0422c507bea2847b16935a106df97a91bb13eecc99ff5d3b4423c82ac80bb7c404f150a04a3de6143ed469f5363c2da9821b86822cbec70ed177ce349f6fdab8e4b6f1f9b8fe3f2a92c5ef1cef1c89ea1073a2aec9ef84f4607dd5e2bb13528b029544e4d59fa6933ff3da82cdfb719d8b5945e2022ab6baae2b7de3157c75ff1922e8845c1683471224b82680ed7e9e0ac727d0c08a735c88272ab73684c2a547b695da0811f14c6c7c63db056bfe946f8094", 0xf9, 0x2}, {&(0x7f00000016c0)="7ff8b5fecfe15e7922821f9416bd98dedf05333e898a6196e98d14a00f25a7648df5a2cd28589a36babe9fefa8cb1720c862e79870d675d31ea82c810fe500b11b1d12abd3de", 0x46, 0xff}, {&(0x7f0000001740), 0x0, 0x7}], 0x200040, &(0x7f0000001940)={[{@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@shortname_lower='shortname=lower'}, {@shortname_lower='shortname=lower'}, {@nonumtail='nnonumtail=1'}, {@utf8='utf8=1'}], [{@fowner_eq={'fowner'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/loop-control\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, '/dev/bsg\x00'}}, {@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, ']\\&}\xce('}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, '+'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/loop-control\x00'}}, {@subj_role={'subj_role', 0x3d, '$('}}]}) [ 2115.130427][T28384] loop4: detected capacity change from 264192 to 0 20:00:02 executing program 4: ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) rt_sigsuspend(&(0x7f0000000280), 0x8) [ 2115.308060][T28360] bridge0: port 1(bridge_slave_0) entered blocking state [ 2115.315366][T28360] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:02 executing program 4: syz_mount_image$vfat(&(0x7f00000003c0)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)) 20:00:02 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2115.444311][T28380] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000480)}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newlink={0x64, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa, 0x4, @local}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) [ 2115.799049][T19459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2115.811044][T28394] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:02 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) [ 2115.974695][T28409] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 2116.001157][T28374] bridge0: port 1(bridge_slave_0) entered blocking state [ 2116.008496][T28374] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:02 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050012fe", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:02 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x8, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2116.222652][T28381] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:03 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510057a1201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2116.406823][T28416] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 20:00:03 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x65580000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6c8f}, 0x40) [ 2116.447924][T28424] __nla_validate_parse: 16 callbacks suppressed [ 2116.447942][T28424] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2116.547600][T28427] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2116.568159][T28427] bridge0: port 1(bridge_slave_0) entered blocking state [ 2116.575362][T28427] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:03 executing program 4: openat$bsg(0xffffffffffffff9c, 0x0, 0x440000, 0x0) [ 2116.642192][T28425] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2116.678556][T28429] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:03 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x200300, 0x0) 20:00:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f0000000600)=@framed, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700), 0x8, 0x10, 0x0}, 0x78) [ 2116.967646][T28437] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2116.995183][T28437] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.002500][T28437] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) [ 2117.061887][T19459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:00:04 executing program 4: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECV=@use_registered_buffer, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x0) [ 2117.216992][T28444] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001880)=[{&(0x7f0000001440)="cf", 0x1, 0x8}], 0x0, 0x0) [ 2117.517984][T28430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2117.535906][T28427] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2117.545484][T28427] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.552946][T28427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2117.676796][T28428] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 2117.716960][T28460] bridge0: port 1(bridge_slave_0) entered disabled state [ 2117.915945][T28447] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2117.925560][T28447] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.932756][T28447] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:04 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff05100500121f", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 2117.963720][T28437] bridge0: port 1(bridge_slave_0) entered disabled state [ 2118.197883][T28484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:05 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005831201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:05 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2118.280568][T28490] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2118.311346][T28490] bridge0: port 1(bridge_slave_0) entered blocking state [ 2118.318682][T28490] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:05 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x81000000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2118.589113][T28491] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 20:00:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 2119.119638][T28507] bridge0: port 1(bridge_slave_0) entered blocking state [ 2119.126826][T28507] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 20:00:06 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x88470000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2119.184200][T28510] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 2119.502659][T28490] bridge0: port 1(bridge_slave_0) entered blocking state [ 2119.509939][T28490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2119.535347][T28514] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 20:00:06 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff0510050012fe", 0x2e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:06 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x2, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2119.825773][T28507] bridge0: port 1(bridge_slave_0) entered blocking state [ 2119.832994][T28507] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:06 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x88480000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:06 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005002001", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) [ 2120.060531][T28552] bridge0: port 1(bridge_slave_0) entered blocking state [ 2120.067825][T28552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2120.150972][T28557] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:07 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 20:00:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 20:00:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) 20:00:07 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x3, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2120.735078][T28568] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 2121.142693][T28552] bridge0: port 1(bridge_slave_0) entered blocking state [ 2121.150016][T28552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2121.187113][T28587] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x20458, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r1 = creat(0x0, 0x1f4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x1ec) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r2, 0x0, 0x44, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x3f) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000400)=ANY=[], 0x8) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000100)=0xfffffffe, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x9, 0xc2050, 0xffffffffffffffff, 0x826bc000) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(r1, 0x40247007, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(r0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 2121.496735][T28589] __nla_validate_parse: 14 callbacks suppressed [ 2121.496755][T28589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:08 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0xa}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2121.609433][T28567] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2121.633946][T28564] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 20:00:08 executing program 4: syz_mount_image$vfat(&(0x7f00000003c0)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5, &(0x7f0000001880)=[{&(0x7f0000000440)="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", 0x5f9}, {&(0x7f0000001440)="cf24803f94247cbe0246535a8328ac2ffdd737fd5040043838e6e930bd1c8dbb07d7383f9374dbfd373bdb9716385770d255f8972398e02471d3512bbbfd58cc3888e7b86d35bfa103663214c952b7979168b6cb6e77035558d6cda02adbfa8973ad594312a65160a509", 0x6a, 0x8}, {&(0x7f0000001500)="544b47fb3e4272b63e3fc31200a82accebf4854e15c22b4f21dd6c45a3f6390bbdefdbe95c6b19d05cf41e182b6fb73c6e874f5b4fa3856c25eb2b5ea08ef583950a3f9e4e74522be7e77c9b8dd5430fe04766b8c3bfcc6878c93ec2fa0fba412f253e4828f96aef1b42467580b998274a77443a8557a27826058121597d6bb0550f128065dfd1c12ca60adf80ac853e3081270c62a4b27dc1b06f0812274d08104438a45a7a", 0xa6, 0xfffffffffffffffa}, {0x0, 0x0, 0x2}, {0x0, 0x0, 0xff}], 0x0, &(0x7f0000001940)={[{@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@shortname_lower='shortname=lower'}, {@utf8='utf8=1'}], [{@fowner_eq={'fowner'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/loop-control\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, ']\\&}\xce('}}]}) [ 2121.658817][T28564] bridge0: port 1(bridge_slave_0) entered blocking state [ 2121.666063][T28564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2121.750361][T28573] bridge0: port 1(bridge_slave_0) entered disabled state [ 2121.775844][T28621] loop4: detected capacity change from 16383 to 0 20:00:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 2121.823144][T28621] FAT-fs (loop4): Unrecognized mount option "fowner=00000000000000000000" or missing value 20:00:08 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005004001", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)='9', 0x1}], 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f00000000c0)=""/41) 20:00:08 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:08 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x4, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2122.033776][T28589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2122.047932][T28618] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2122.066243][T28618] bridge0: port 1(bridge_slave_0) entered blocking state [ 2122.074393][T28618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2122.155617][T28628] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.214010][T28639] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2122.249561][T28639] bridge0: port 1(bridge_slave_0) entered blocking state [ 2122.256946][T28639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2122.288191][T28631] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.303645][T28645] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2122.360922][T28647] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:09 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x10}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:09 executing program 4: syz_io_uring_setup(0x7646, &(0x7f0000000100), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0xa5f, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x206}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000900), &(0x7f0000000940)) [ 2122.695685][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2122.721074][T28653] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 20:00:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) [ 2122.745809][T28639] bridge0: port 1(bridge_slave_0) entered blocking state [ 2122.752971][T28639] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:09 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x25}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:09 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xc3ffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2122.826225][T28647] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:09 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x5, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendto$inet(r1, 0x0, 0x0, 0xaad57c81b7a27570, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) pselect6(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 20:00:10 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0xc0}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:10 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001202", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:10 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xefffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 20:00:10 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x6, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2123.429611][T28709] bridge0: port 1(bridge_slave_0) entered disabled state [ 2123.780537][T28712] bridge0: port 1(bridge_slave_0) entered blocking state [ 2123.787822][T28712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2123.829881][T28718] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:10 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2124.127599][T28709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2124.134736][T28709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2124.149251][T28733] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:11 executing program 4: syz_io_uring_setup(0x7646, &(0x7f0000000100), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0xa5f, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000900), &(0x7f0000000940)) [ 2124.293842][T28712] bridge0: port 1(bridge_slave_0) entered blocking state [ 2124.301120][T28712] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:11 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0xec0}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:11 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:11 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x7, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 20:00:11 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001203", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2124.487403][T28754] bridge0: port 1(bridge_slave_0) entered blocking state [ 2124.495351][T28754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2124.586639][T28754] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:11 executing program 4: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x1000) 20:00:11 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000700bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 2125.112479][T28779] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:12 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x33fe0}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:12 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:12 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000700bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 20:00:12 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000700bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 2125.865290][T28800] bridge0: port 1(bridge_slave_0) entered blocking state [ 2125.872427][T28800] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:12 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x8, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) [ 2125.945948][T28774] bridge0: port 1(bridge_slave_0) entered blocking state [ 2125.953280][T28774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2126.003489][T28804] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:12 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xffff0000}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:12 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000700bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) [ 2126.641541][T28781] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:13 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x10000000) [ 2126.910849][T28823] __nla_validate_parse: 23 callbacks suppressed [ 2126.910867][T28823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:13 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x200300, 0x0) 20:00:13 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001204", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2126.954987][T28824] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2126.989452][T28800] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 20:00:13 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xffffa888}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2127.010997][T28800] bridge0: port 1(bridge_slave_0) entered blocking state [ 2127.018236][T28800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2127.057324][T28833] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:14 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2000022e}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:14 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518008906bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 2127.264412][T28842] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2127.281456][T28844] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:14 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x9, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2127.326339][T28853] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2127.360074][T28853] bridge0: port 1(bridge_slave_0) entered blocking state [ 2127.368696][T28853] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) [ 2127.453848][T28856] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r3, &(0x7f00000008c0)={&(0x7f0000000240), 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0x14, 0x3, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@generic]}, 0x14}}, 0x20000000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2127.875962][T28882] kvm [28880]: vcpu0, guest rIP: 0x13c Hyper-V unhandled wrmsr: 0x40000024 data 0xab [ 2127.902702][T28882] kvm [28880]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000061 data 0x230 [ 2127.918738][T28864] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2127.937261][T28864] bridge0: port 1(bridge_slave_0) entered blocking state [ 2127.944618][T28864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2127.964811][T28874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:14 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2128.022442][T28871] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:14 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x7ffff000}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:14 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001205", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2128.089397][T28877] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:15 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0xa, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) [ 2128.372462][T28915] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.379734][T28915] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:15 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r3, &(0x7f00000008c0)={&(0x7f0000000240), 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0x14, 0x3, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@generic]}, 0x14}}, 0x20000000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:15 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x2}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2128.483986][T28923] bridge0: port 1(bridge_slave_0) entered disabled state [ 2128.742313][T28933] kvm [28931]: vcpu0, guest rIP: 0x13c Hyper-V unhandled wrmsr: 0x40000024 data 0xab [ 2128.779005][T28933] kvm [28931]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000061 data 0x230 [ 2128.852658][T28915] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.859853][T28915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2128.934805][T28942] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:15 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xffffffc3}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r3, &(0x7f00000008c0)={&(0x7f0000000240), 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0x14, 0x3, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@generic]}, 0x14}}, 0x20000000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2129.331240][T28961] kvm [28960]: vcpu0, guest rIP: 0x13c Hyper-V unhandled wrmsr: 0x40000024 data 0xab [ 2129.352490][T28961] kvm [28960]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000061 data 0x230 [ 2129.384190][ T6230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2129.417938][T28923] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:16 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0xb, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r3, &(0x7f00000008c0)={&(0x7f0000000240), 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0x14, 0x3, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@generic]}, 0x14}}, 0x20000000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2129.797892][T28938] bridge0: port 1(bridge_slave_0) entered blocking state [ 2129.805089][T28938] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 20:00:16 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001206", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2129.855705][T28978] kvm [28977]: vcpu0, guest rIP: 0x13c Hyper-V unhandled wrmsr: 0x40000024 data 0xab 20:00:16 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xffffffef}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:16 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x3}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:16 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0xf, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2129.923736][T28978] kvm [28977]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000061 data 0x230 20:00:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r3, &(0x7f00000008c0)={&(0x7f0000000240), 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0x14, 0x3, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@generic]}, 0x14}}, 0x20000000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2130.292517][T29006] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:17 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2130.430237][T29015] kvm [29007]: vcpu0, guest rIP: 0x13c Hyper-V unhandled wrmsr: 0x40000024 data 0xab [ 2130.459500][T29015] kvm [29007]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x40000061 data 0x230 [ 2130.590947][T29012] bridge0: port 1(bridge_slave_0) entered blocking state [ 2130.598292][T29012] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:17 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x4}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2130.668459][T29019] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r3, &(0x7f00000008c0)={&(0x7f0000000240), 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0x14, 0x3, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@generic]}, 0x14}}, 0x20000000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) [ 2131.168223][T29037] bridge0: port 1(bridge_slave_0) entered blocking state [ 2131.175498][T29037] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0), 0xc}, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r3, &(0x7f00000008c0)={&(0x7f0000000240), 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0x14, 0x3, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {}, [@generic]}, 0x14}}, 0x20000000) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:18 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x10, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2131.401374][T29044] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:18 executing program 4: pselect6(0x40, &(0x7f0000000580), 0x0, &(0x7f0000000600)={0x8}, 0x0, 0x0) [ 2131.842552][T29012] bridge0: port 1(bridge_slave_0) entered blocking state [ 2131.849777][T29012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2131.885826][T29023] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:18 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001207", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:18 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080)={[0x6]}, 0x8) 20:00:18 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2132.074452][T29059] __nla_validate_parse: 21 callbacks suppressed [ 2132.074471][T29059] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2132.137712][T29063] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:19 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='rxrpc_tx_data\x00'}, 0x10) [ 2132.183498][T29037] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2132.205952][T29037] bridge0: port 1(bridge_slave_0) entered blocking state [ 2132.213147][T29037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2132.262097][ T2640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2132.283268][T29094] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:19 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x5}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2132.312860][T29096] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2132.344428][T29097] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 20:00:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x815e1599}, 0x0) [ 2132.371312][T29097] bridge0: port 1(bridge_slave_0) entered blocking state [ 2132.378518][T29097] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:19 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x11, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:19 executing program 4: openat$random(0xffffffffffffff9c, 0x0, 0x618f00, 0x0) [ 2132.457972][T29100] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:19 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00') 20:00:19 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2132.888876][T29107] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2132.903871][T29109] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:19 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, 0x0, 0x0) [ 2133.162601][T29115] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2133.226470][T29113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2133.261930][T29097] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2133.277596][T29097] bridge0: port 1(bridge_slave_0) entered blocking state [ 2133.284914][T29097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2133.350974][T29100] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:20 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001208", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:20 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000c1c0)) [ 2133.457011][T29107] bridge0: port 1(bridge_slave_0) entered blocking state [ 2133.465110][T29107] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:20 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x79, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:20 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88470000}, 0x0) 20:00:20 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x6}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2133.549950][T29149] bridge0: port 1(bridge_slave_0) entered blocking state [ 2133.557167][T29149] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:20 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:20 executing program 4: syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x240) [ 2133.642582][T29150] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:20 executing program 4: waitid(0xba20503f25f36ba8, 0xffffffffffffffff, 0x0, 0x8, 0x0) 20:00:20 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) waitid(0x0, 0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 20:00:20 executing program 4: syz_mount_image$ext4(&(0x7f000000af00)='ext3\x00', &(0x7f000000af40)='./file0\x00', 0x0, 0x2, &(0x7f000000c140)=[{&(0x7f000000af80)="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", 0xa33, 0x7}, {0x0, 0x0, 0x3f}], 0x0, &(0x7f000000c1c0)={[{@max_batch_time={'max_batch_time'}}, {@nobh='nobh'}]}) [ 2134.170951][T29166] bridge0: port 1(bridge_slave_0) entered disabled state [ 2134.171314][T29182] loop4: detected capacity change from 5 to 0 [ 2134.189918][T29182] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2134.246390][T29182] loop4: detected capacity change from 5 to 0 [ 2134.254279][T29182] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 20:00:21 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x26c41, 0x0) [ 2134.342182][T29149] bridge0: port 1(bridge_slave_0) entered blocking state [ 2134.349334][T29149] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:21 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2134.511112][T29150] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:21 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff05100500120a", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:21 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f000000c140), 0x0, 0x0) [ 2134.772625][T29159] bridge0: port 1(bridge_slave_0) entered blocking state [ 2134.779931][T29159] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:21 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0xaa, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:21 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88480000}, 0x0) 20:00:21 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x7}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2134.910214][T29213] bridge0: port 1(bridge_slave_0) entered blocking state [ 2134.917437][T29213] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:21 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 20:00:21 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2135.046221][T29213] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, 0x9, 0x0, 0x59074c6b}}) 20:00:22 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:22 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) 20:00:22 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) [ 2135.653216][T29238] bridge0: port 1(bridge_slave_0) entered disabled state [ 2135.850144][T29229] bridge0: port 1(bridge_slave_0) entered blocking state [ 2135.857366][T29229] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:22 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff05100500120c", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:22 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/pid_for_children\x00') 20:00:22 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0xac, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:22 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 20:00:22 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x8}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:22 executing program 4: clock_gettime(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x10000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x20200, 0x0) [ 2136.227555][T29278] bridge0: port 1(bridge_slave_0) entered blocking state [ 2136.234968][T29278] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:23 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/mnt\x00') [ 2136.334450][T29278] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:23 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000080)) 20:00:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) [ 2136.643687][T29284] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:23 executing program 4: mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000000000/0x13000)=nil, 0x4000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mlockall(0x1) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x1500, 0x0, 0xffffffffffffff39) [ 2136.997649][T29288] bridge0: port 1(bridge_slave_0) entered blocking state [ 2137.004912][T29288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2137.053005][T29278] bridge0: port 1(bridge_slave_0) entered disabled state [ 2137.416577][T29293] __nla_validate_parse: 23 callbacks suppressed [ 2137.416644][T29293] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:24 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001218", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:24 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0xa}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2137.470881][T29324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:24 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:24 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0xfc, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x99155e81}, 0x0) [ 2137.551058][T29329] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2137.595471][T29329] bridge0: port 1(bridge_slave_0) entered blocking state [ 2137.602667][T29329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2137.684599][T29331] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2137.722437][T29331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2137.729687][T29331] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:24 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2137.830637][T29334] bridge0: port 1(bridge_slave_0) entered disabled state [ 2138.135670][T29335] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:25 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, 0x0) 20:00:25 executing program 4: setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast1, 0x0, 0x0, 'ovf\x00'}, 0xffffffffffffffd1) [ 2138.438932][T29338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2138.485488][T29346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2138.522274][T29331] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2138.532464][T29331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2138.539799][T29331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2138.551003][T29334] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:25 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {0x8000}]}) 20:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 20:00:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv4_newrule={0x24, 0x20, 0xe31, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8}]}, 0x24}}, 0x0) [ 2138.848985][T29329] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2138.864239][T29329] bridge0: port 1(bridge_slave_0) entered blocking state [ 2138.871569][T29329] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:25 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001225", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) [ 2138.897940][ T1433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2138.912565][T29364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:25 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0xc}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:25 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2138.946939][T29346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:00:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 20:00:25 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 20:00:25 executing program 4: clock_gettime(0x0, &(0x7f0000000240)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={r0}, 0x0) [ 2139.064948][T29383] bridge0: port 1(bridge_slave_0) entered blocking state [ 2139.072172][T29383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2139.119763][T29385] bridge0: port 1(bridge_slave_0) entered disabled state [ 2139.581288][T29383] bridge0: port 1(bridge_slave_0) entered disabled state [ 2139.793866][T29392] bridge0: port 1(bridge_slave_0) entered blocking state [ 2139.801002][T29392] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:26 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001229", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:26 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0xf) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:26 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 20:00:26 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x18}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:26 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x2, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2140.042117][T29420] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.049363][T29420] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:26 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r0, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x1}, 0x8) 20:00:26 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) [ 2140.139280][T29430] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:27 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x25}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2140.688464][T29420] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.695894][T29420] bridge0: port 1(bridge_slave_0) entered forwarding state 20:00:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 20:00:27 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x29}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:27 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x60) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:27 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001237", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {&(0x7f0000000300)}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {&(0x7f0000001d40)}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240)=@un=@abs, 0x80, 0x0}, 0x0) 20:00:27 executing program 5: socket(0x0, 0x803, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x3, r3}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) [ 2140.923394][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:00:27 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x37}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:00:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r4}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) [ 2141.694984][T29488] bridge0: port 1(bridge_slave_0) entered disabled state 20:00:28 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff05", 0x26}], 0x1}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x1}, 0x300) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c4659e5a59dcb9247621", 0x10}, {0x0}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa22", 0x6f}, {0x0}, {0x0}], 0x5, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 20:00:28 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104050c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff051005001201", 0x2e}], 0x118}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x0, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000140)="f45895651a05c465", 0x8}, {&(0x7f0000000300)="b382b4bc26874ec31e88509f0133cb2b50fba63f7da2b3cedf181d1da9b08a5ffa877c8ae9946a447bcac2e4cbb442d70c61e694c47bf7addcebdb39", 0x3c}, {&(0x7f0000000380)="bc04c14afdb0f411113d16eff678eab7534963014fed43dd23b37f510b182fd86d836a253778a98ec9e49dd5bda77af7a20bc063d5fd4d27d90af7c5ffe8f709c5a9b9fde52c4eb545ee9341949b2355e38c66622ad0144eeb8b0987413f30a0879e676dd2e40e5ed91b313b52aa224a02b11bbead9019613dffdbfe16ad7bd63a7eb11aa22057fed9d00081f2c23ed6dd57b3dd0fd387c69150adde689ab12c5f", 0xa1}, {&(0x7f0000000480)}, {0x0}, {0x0}], 0x6, &(0x7f0000000640)="85905463b7fbeb170e3e1f8daceab5899c815eacadbd248860afd792", 0x1c, 0x40}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 2142.304068][T29504] bridge0: port 1(bridge_slave_0) entered blocking state [ 2142.311202][T29504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2142.433757][T29488] bridge0: port 1(bridge_slave_0) entered disabled state [ 2142.553514][T29522] __nla_validate_parse: 25 callbacks suppressed [ 2142.553535][T29522] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2142.602447][T29532] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2143.538581][T29441] general protection fault, probably for non-canonical address 0xdffffc0000000121: 0000 [#1] PREEMPT SMP KASAN [ 2143.550525][T29441] KASAN: null-ptr-deref in range [0x0000000000000908-0x000000000000090f] [ 2143.558941][T29441] CPU: 0 PID: 29441 Comm: syz-executor.4 Not tainted 5.11.0-rc4-syzkaller #0 [ 2143.567709][T29441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2143.577920][T29441] RIP: 0010:hci_chan_del+0x48/0x190 [ 2143.583211][T29441] Code: 5c 24 18 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 f9 5d fe f8 4c 8b 33 49 8d 9e 08 09 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 d9 5d fe f8 4c 8b 3b 0f 1f 44 00 [ 2143.603360][T29441] RSP: 0018:ffffc9000c387a18 EFLAGS: 00010206 [ 2143.609405][T29441] RAX: 0000000000000121 RBX: 0000000000000908 RCX: 0000000000040000 [ 2143.617702][T29441] RDX: ffffc90011647000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2143.625667][T29441] RBP: ffff888014581008 R08: dffffc0000000000 R09: ffffed10028b024f [ 2143.633641][T29441] R10: ffffed10028b024f R11: 0000000000000000 R12: ffff888022cf1600 [ 2143.641608][T29441] R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff110028b0201 [ 2143.649571][T29441] FS: 00007f61568ac700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 2143.658480][T29441] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2143.665072][T29441] CR2: 000055f9fc8d76b8 CR3: 000000009b1cf000 CR4: 00000000001526f0 [ 2143.673074][T29441] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2143.681027][T29441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2143.689090][T29441] Call Trace: [ 2143.692362][T29441] l2cap_conn_del+0x4c5/0x650 [ 2143.697094][T29441] ? l2cap_connect_cfm+0x5c0/0x5c0 [ 2143.702184][T29441] hci_conn_hash_flush+0x112/0x240 [ 2143.707275][T29441] hci_dev_do_close+0xa04/0xfe0 [ 2143.712173][T29441] hci_rfkill_set_block+0x10f/0x180 [ 2143.717357][T29441] ? rcu_lock_release+0x20/0x20 [ 2143.722183][T29441] rfkill_set_block+0x1f1/0x440 [ 2143.727092][T29441] rfkill_fop_write+0x594/0x750 [ 2143.731921][T29441] ? rfkill_fop_read+0x490/0x490 [ 2143.736851][T29441] ? rw_verify_area+0x1b8/0x370 [ 2143.741680][T29441] ? fsnotify_perm+0x63/0x4d0 [ 2143.746332][T29441] ? rfkill_fop_read+0x490/0x490 [ 2143.751262][T29441] vfs_write+0x289/0xc90 [ 2143.755570][T29441] ? __lock_acquire+0x5e40/0x5e40 [ 2143.760575][T29441] ? file_end_write+0x220/0x220 [ 2143.765430][T29441] ? __fget_files+0x34f/0x380 [ 2143.770086][T29441] ? __fdget_pos+0x1d8/0x2f0 [ 2143.774651][T29441] ? ksys_write+0x72/0x2a0 [ 2143.779046][T29441] ksys_write+0x171/0x2a0 [ 2143.783368][T29441] ? __ia32_sys_read+0x80/0x80 [ 2143.788109][T29441] ? syscall_enter_from_user_mode+0x24/0x190 [ 2143.794068][T29441] ? syscall_enter_from_user_mode+0x24/0x190 [ 2143.800022][T29441] do_syscall_64+0x2d/0x70 [ 2143.804433][T29441] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2143.810319][T29441] RIP: 0033:0x45e219 [ 2143.814210][T29441] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2143.833806][T29441] RSP: 002b:00007f61568abc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2143.842203][T29441] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 2143.850310][T29441] RDX: 0000000000000008 RSI: 0000000020000000 RDI: 0000000000000004 [ 2143.858320][T29441] RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.866320][T29441] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 2143.874276][T29441] R13: 00007fff0653c4df R14: 00007f61568ac9c0 R15: 000000000119bf8c [ 2143.882247][T29441] Modules linked in: [ 2143.890051][T29441] ---[ end trace 90329eb6cac9dea3 ]--- [ 2143.897436][T29441] RIP: 0010:hci_chan_del+0x48/0x190 [ 2143.905327][T29441] Code: 5c 24 18 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 f9 5d fe f8 4c 8b 33 49 8d 9e 08 09 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 d9 5d fe f8 4c 8b 3b 0f 1f 44 00 [ 2143.926502][T29441] RSP: 0018:ffffc9000c387a18 EFLAGS: 00010206 [ 2143.937268][T29441] RAX: 0000000000000121 RBX: 0000000000000908 RCX: 0000000000040000 [ 2143.946151][T29441] RDX: ffffc90011647000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2143.954513][T29441] RBP: ffff888014581008 R08: dffffc0000000000 R09: ffffed10028b024f [ 2143.962547][T29441] R10: ffffed10028b024f R11: 0000000000000000 R12: ffff888022cf1600 [ 2143.972053][T29441] R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff110028b0201 [ 2143.980813][T29441] FS: 00007f61568ac700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 2143.990106][T29441] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2144.002080][T29441] CR2: 00007f9d98036000 CR3: 000000009b1cf000 CR4: 00000000001526e0 [ 2144.011886][T29441] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2144.021720][T29441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2144.032355][T29441] Kernel panic - not syncing: Fatal exception [ 2144.039485][T29441] Kernel Offset: disabled [ 2144.043875][T29441] Rebooting in 86400 seconds..