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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_GET_CPUID2(r4, 0x4008ae8a, &(0x7f0000000000)) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:51:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, 0x0) [ 597.245211][ T8085] bridge0: port 1(bridge_slave_0) entered disabled state 07:51:49 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r1 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x63e90fd764e61576) perf_event_open(&(0x7f0000000040)={0x2, 0x69, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x400}, 0xffffffffffffffff, 0x0, r1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4088000}, 0x8000) syz_genetlink_get_family_id$ipvs(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) [ 597.358974][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 597.364787][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:51:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="8780090a0162914630f066fc", 0x1e8}], 0x1}], 0x61, 0x0) 07:51:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r5, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x4, 0x6, @dev={[], 0xe}}, 0xfffffffffffffff5) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r9 = socket$netlink(0x10, 0x3, 0x0) sendfile(r9, r8, 0x0, 0x7fffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r8, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x9, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000200)={0x2, 0xf, 0x6, 0x7}, &(0x7f0000000280)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4a}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@x25, &(0x7f0000000240)=0x80, 0x400) bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x20008006) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @rand_addr=0x9}}}, 0xa0) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="48000000100005070000009353596fcc7f8b8d00", @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x264, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r13, @ANYBLOB="08000200fffffdbf"], 0x20}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000000104000000000000000002f100000000", @ANYRES32=r13, @ANYBLOB="0800020000000000"], 0x20}}, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="48000000100005070000009353596fcc7f8b8d00", @ANYRES32=r18, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r15, &(0x7f0000000180)={0x0, 0x264, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r18, @ANYBLOB="08000200fffffdbf"], 0x20}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000000104000000000000000002f100000000", @ANYRES32=r18, @ANYBLOB="0800020000000000"], 0x20}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000e00)={&(0x7f0000000140), 0xc, &(0x7f0000000dc0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="7c0100001a00080025bd7000fcdbdf251c142006fd008a886b0848bb8c8a01000000000008001a007f0000001400120005001d6b41da072fb288fe124d1a78d38400130000000f000000000000000b000000030000000000000000000000000000000000000000000000000000000b00000000000000000000000000000000000000000000000000000000000000000000000f00000000000000010000000b000000000000000000000000000000000000000000000000000000080000000100000007000c00090000000407", @ANYRES32=r8, @ANYBLOB="0c00090000001f40", @ANYRES32=r13, @ANYBLOB="08001a00700000000c0009007a070780", @ANYRES32=r18, @ANYBLOB="84001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000e0000000000000000000000000000000f00000000000000000000000000000000000000000200000000000000000000000000000004000000000000000000000000000000000000000000000000000800010000000000"], 0x17c}, 0x1, 0x0, 0x0, 0x10}, 0x4040084) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 07:51:49 executing program 4: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) stat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_int(r1, 0x10d, 0x91, 0x0, &(0x7f0000000000)=0xfffffffffffffd01) 07:51:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r1, r0}}, 0x18) open(0x0, 0x0, 0x0) 07:51:49 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) accept$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000140)={@dev={0xac, 0x14, 0x14, 0x26}, @loopback, r4}, 0xc) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f0000000140)={r9, 0x7}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r9, @in6={{0xa, 0x4e21, 0x9, @loopback, 0xffffff4c}}, 0x7ff, 0x7, 0xd87d, 0x3f, 0x4}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000380)={r10, @in={{0x2, 0x4e22, @local}}, [0x0, 0xf5, 0x80, 0x6, 0x60, 0x3, 0x3, 0x100000001, 0x6, 0x4, 0x6, 0x2, 0x6, 0x9, 0x1]}, &(0x7f0000000300)=0x100) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000680)=[{&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000140)=""/93, 0x5d}, {&(0x7f00000004c0)=""/236, 0xec}, {&(0x7f0000000700)=""/28, 0xffffff80}, {&(0x7f00000005c0)=""/187, 0xbb}], 0x5, &(0x7f0000000200)=""/10, 0x14}, 0xd10c) socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) [ 597.938839][ T8085] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.100139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 598.122588][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.129773][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:49 executing program 4: poll(&(0x7f0000000000), 0x2000000000000029, 0x7f) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000000)=""/36, 0x24}], 0x1) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0054e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/41, 0x29}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r4, &(0x7f0000000440)=[{0x0}, {&(0x7f00000001c0)=""/90, 0x5a}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r3, 0x0) shutdown(r0, 0x0) 07:51:49 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r6, r5, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x5, &(0x7f0000000000)='\\).-\x00', r8}, 0x30) sched_setscheduler(r9, 0x2, &(0x7f0000000140)=0x8) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:50 executing program 2: unshare(0x2a000400) clone(0x20804000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(0xffffffffffffffff) 07:51:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000380)=""/233, 0xe9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0xd172, 0x2, 0x0, 0x800e0050e) shutdown(r1, 0x0) 07:51:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={r6, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r6, 0x9, 0x3, 0xea28}, &(0x7f0000000080)=0x10) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r7 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x20008006) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) accept4$vsock_stream(r7, 0x0, 0x0, 0x0) [ 598.397733][T10254] ptrace attach of "/root/syz-executor.1"[9007] was attempted by "/root/syz-executor.1"[10254] 07:51:50 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000030207031dfffd946fa2830020200a0009040200001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 598.479220][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.485067][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 598.559014][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.564876][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 598.570749][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.576503][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 598.627281][T10593] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 598.650732][ T9662] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.816482][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 598.825125][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.832226][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 07:51:50 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000030207031dfffd946fa2830020200a0009040200001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 07:51:50 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) r2 = dup3(r0, r1, 0x80000) connect$rds(r2, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000140)={0xabb, 0x1, 0x4bee, 0x5, 0x0, 0x6}) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r4 = msgget$private(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000440), &(0x7f0000000480)) r7 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r7}, {0x2, 0x5, r8}, {0x2, 0x5, r9}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) r11 = fcntl$getown(r2, 0x9) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000580)={{0x2ed, r5, r6, r8, r10, 0x4, 0x3}, 0x1cd, 0x7, 0x0, 0x5, 0x4, 0xffff, r11, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r12 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x501000, 0x0) ioctl$PIO_UNISCRNMAP(r12, 0x4b6a, &(0x7f0000000200)="c65a7ebd62873d87811c6f9c3eed") ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000380)={0x9d, ""/157}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:50 executing program 2: tkill(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) wait4(0x0, 0x0, 0x0, 0x0) 07:51:50 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr={0x81, 0x6}}], 0x30) [ 598.980908][T10728] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 07:51:50 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='cpu\t&\"6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 07:51:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x24000000) open(0x0, 0x40c5, 0x0) pipe(0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f00000004c0)) r5 = getpid() pipe(0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) stat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = fcntl$getown(r12, 0x9) ptrace$setopts(0x4200, r13, 0x40002, 0x51) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) getresgid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001f00)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000180)="d7c9deb6c1bcbd2b35ecf7fdbc1f5d2b384548cb83d54f2904a6eda7e218750fac372e63c41a470363", 0x29}, {0x0}, {&(0x7f00000003c0)="b4688de86a9199dd6b6431eaf2887aebf8f45bf336b4fcd69bbcde72544d7319349ecd6d81337edb07cc818ed4b5213f052a92bd3af8e226a3c1a742869083e57d2e44d2d7fa272cfe585e83d474f044f84bb166d55191e2", 0x58}], 0x4, &(0x7f00000017c0)=[@cred={{0x18, 0x1, 0x2, {r5, 0x0, r4}}}, @cred={{0x18, 0x1, 0x2, {r7, r9, r4}}}, @cred={{0x18, 0x1, 0x2, {r2, 0x0, r4}}}], 0x48}, {&(0x7f0000001840)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000001d80)}], 0x2, 0x40) write$9p(0xffffffffffffffff, &(0x7f00000004c0), 0x0) 07:51:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x94u\xb7\xfbr\xf3\xf0\xaae\x8d\xa1\xa9%\x00\xb2B[_v\"b\xf2:\x12\x86*\xc6\x1b\xb3o\xcbe\xa7\x87i\xf7\x8e\xa5m\xc6E8\xca\xb1\x9b\x1c\r\x9ak\xe5J\xa0\x110\xd2q\x98\xc5\xc3\xaa\x89\xc1\xce\xde\xf1\vp\xderD\xc6uu\x1d\xef\xf7\x17@\x17\xf1\xf1D\xb0\xd6\x8eD\xb0\x0e[\a\x97\x9f\xadH\xd4\xc4\xde\v\x93J\xd8\xad\xf1\xf8Jr\xf3kY=\xab5\xa0#\xbf\xb9L2', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fchdir(r0) open(0x0, 0x141042, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$ppp(r1, &(0x7f00000000c0)=']', 0x17f) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) lseek(r3, 0x0, 0x3) 07:51:50 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$GETALL(0x0, 0x0, 0x12, &(0x7f0000000000)=""/94) 07:51:51 executing program 3: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2000000000f, &(0x7f0000f10000)=0xfffffffffffff830, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 07:51:51 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(&(0x7f00000007c0)='/dev/vcsu#\x00', 0x0, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r3, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\xff\x00\x10\x80\x00') ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\xff\x00\x10\x80\x00') ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffffffe) sendfile(r2, r1, 0x0, 0x7fffffff) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 599.597250][T10845] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.739949][T10856] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.747050][T10856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 599.905669][T10845] bridge0: port 1(bridge_slave_0) entered disabled state 07:51:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x1f, 0x7]}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:51 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x3bb, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000008ff8)=0x3f) recvmsg(r1, &(0x7f0000000240)={0x0, 0x11e, 0x0, 0x0, 0x0, 0xfffffd17}, 0x0) r2 = dup2(r0, r1) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 07:51:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000380)=""/233, 0xe9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) fchmod(0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0xd172, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) 07:51:51 executing program 4: setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 07:51:51 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) pkey_alloc(0x0, 0x3) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000001c0)=""/105) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000000)={@remote}, 0x14) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:51 executing program 0: syz_emit_ethernet(0x62, &(0x7f0000000280)={@local, @random="c1175d872391", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x2c, 0x6, 0x0, @local, @rand_addr="cb24dab374060f4666cc9101250889ad", {[], @tipc=@payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xe, 0xd77]}) [ 599.975446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 599.984122][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.991266][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:51 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa2830020020a0009000000001d85680c1ba3a20400ff7e280000002600ffff", 0xfffffffffffffda9}], 0x100000000000034b}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 07:51:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, 0x0) sendmmsg$alg(r0, &(0x7f0000002b80)=[{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="8780090a0162914630f066fc", 0x1e8}], 0x1}], 0x61, 0x0) 07:51:52 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x3bb, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 07:51:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) read(r0, &(0x7f0000000000)=""/237, 0xed) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/143, 0x8f}, {0x0}], 0x2) shutdown(r1, 0x0) 07:51:52 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) r2 = dup2(0xffffffffffffffff, r1) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000380)={0x8, 'syz0\x00'}) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000100)={0x0, 0x3, 0x6, 0x7, &(0x7f00000001c0)=[{}, {}, {}]}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x5f, 0x50, 0x3d, 0x0, 0x0, 0x30]}}, &(0x7f00000006c0)=""/4096, 0x20, 0x1000}, 0x20) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="0600002e00000029a458891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 600.683134][T11528] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.864334][T11768] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.871462][T11768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.059020][T11528] bridge0: port 1(bridge_slave_0) entered disabled state 07:51:52 executing program 0: set_mempolicy(0x4003, &(0x7f0000000000)=0x5, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) 07:51:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002800)='\x00'/10) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 07:51:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_GET_CPUID2(r4, 0x4008ae9c, &(0x7f0000000000)) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:51:52 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr={0x81, 0x5}}], 0x30) 07:51:52 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) pwritev(r1, &(0x7f00000005c0)=[{&(0x7f0000000100)="7a8fa1b7ba3a3126a92e23b2ced4c64eaf95703a", 0x14}, {&(0x7f0000000140)="d01c5fc7256a73d95cc05b13159288f1a2", 0x11}, {&(0x7f00000001c0)="04ceaf0c1b1e58fd6b9064ee9a7fc51c3ef8cd3cd4af847f1943452073584abfc531377c4525b71aa3cde8fc80d2fa0fe0172ec264d032dc935a486679c3d41621b5244ed0221ffc3ec9cbaddb10675bae54c6c0f3f6e3486f4a2c1c6d6b49dfaf32cb7394db022ba17ae7376e4efd12dffc583474894614d9a5da59858178aca5c9335ff561f11179eee08eb648913615b91233569b65f3bc241d43b6cb6493af792071b9be482280988de8120e18353918b7d7ecd3eeeb43873e491a4541", 0xbf}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000380)="41ae35154a5377fcc2fa3fb60f877e2b1595bdf87803be4e4e5bf136bbfd65c3aa8400cd8f7f9de7ae2a07ef9e33843ef872252327e65a5e417d6c369645652178820bf73d753737c57d7a61b4f52a3b11ed31440df384098e9effe9ff35229c00cf8217cbfe533be1328b648ec6db571987d5938aeab8a21ffc71ea34d6ce32b2b69703142c9eebcadb8c7439d7a7e640b89b5367336e1038ffed712cf48dfd6b6c89523ca000836d7e27722da37295fac93e18d51dd806af3546ed5c6e462cc40d22b1", 0xc4}, {&(0x7f0000000280)="7a82808a4c2b2ea9cc6456b8935d82a0ea50466d1c62a9f79882db67040f31de7a75f9b4381faa0f2b63db8afd59f66608b86b725089301dc8b3a2aae25f6f3b7749dc85154c3ca65212e729909ef16e13d1877485e3836562b966b2086e93895d642962caae80297e0ad826951eeb6d842bcfb7769b97fc55f6078d6fa589fdca936126dcf2c338ad6898103efaf651189c", 0x92}, {&(0x7f0000000480)="34b57a687c54cb09aadef91ec211901ad5d111ce0bc537c70682dcea15408cb6170e7380a777c66bddb7c52b78c3ade73cde53bcde3e92ca98146780b981e2093df623c77d7a2ead11c2e8fe572a5fd09ba9fe82083c9e697e53941b5f6d565cb4716e9dd7f0e826a2b87ecafc8fb398ec3ed581bd75ec311b7873bade47174b08", 0x81}, {&(0x7f0000000540)="104874d7d5bf41ee230aa099c7673f66d24be99198b18266b3d09b197862ce1dc8cb85cc4fc0affbae9e7abce1d9ecea4efe07d5086256dfc10f658e32e67e64f619dd397fd296278b8d30900531bca9c22f106491bcaf961a0421cefe9d996ccfc4f28f96d0c96cd8e8a419bb80b30caef441eaae", 0x75}], 0x8, 0x5) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r7 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r7}, {0x2, 0x5, r8}, {0x2, 0x5, r9}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) ioprio_get$uid(0x3, r8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) r10 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x8b8f74e051d5813, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r10, 0x0, 0x2d, &(0x7f0000000280)={0x1, {{0x2, 0x4e24, @broadcast}}}, 0x88) 07:51:52 executing program 2: kexec_load(0x0, 0x10, 0x0, 0x0) [ 601.191449][ T27] audit: type=1326 audit(1576223512.891:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12547 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d74a code=0x0 07:51:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000040)=""/4, 0x4, 0x2, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e006d7) shutdown(r1, 0x0) mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r3, &(0x7f0000002700)={0x0, 0x86, 0x0}, 0x0) shutdown(r2, 0x0) 07:51:53 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = creat(0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) [ 601.283381][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.303598][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.310785][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4cb], 0x5000}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000200)=""/12) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240)={[{0x0, 0x0, 0x0, 0xfd}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x8}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x6, 0x10000, 0x3, 0x40, 0x400}, 0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) epoll_create(0x1) 07:51:53 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0xfffffffffffffffa) [ 601.519030][ C0] net_ratelimit: 8 callbacks suppressed [ 601.519062][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 601.530546][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:51:53 executing program 0: socket$inet6(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000680)=[{&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000140)=""/93, 0x5d}, {&(0x7f00000004c0)=""/236, 0xec}, {&(0x7f0000000700)=""/28, 0xffffff80}, {&(0x7f00000005c0)=""/187, 0xbb}], 0x5, &(0x7f0000000200)=""/10, 0x14}, 0xd10c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 07:51:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 601.889656][T12557] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.986617][ T27] audit: type=1326 audit(1576223513.681:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12547 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d74a code=0x0 07:51:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}, 0x8}, 0x0) 07:51:53 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x124e, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:53 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xd4, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001600ff8e00000000000000000a0077001800000014000a0000008db442560000000000000200000000"], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 07:51:53 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x231060, 0xf31658cf8f0e7ccf) [ 602.128644][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 602.170855][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.178023][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r7 = socket$inet6(0xa, 0x3, 0x3c) ioctl$BLKBSZGET(r6, 0x80081270, &(0x7f00000001c0)) connect$inet6(r7, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) r8 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r8, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r8, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) sendmsg(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="fdf335998ea6311a15e87329d6f7f5d5c8de12b2e5bdaff420", 0x19}], 0x1, 0x0, 0x358}, 0xc100) writev(r7, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) r9 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000000c0)={'b0\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00', 0x6cf3e079b9315e87}) 07:51:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="0600002e00000029a458891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000000)="2400000012005f0214f9f407000904", 0xf) 07:51:53 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = memfd_create(&(0x7f00000005c0)='-\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x800000) getpid() dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x1ffe00) 07:51:54 executing program 3: openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mknod(0x0, 0x1040, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) open$dir(0x0, 0x841, 0x0) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) sched_yield() 07:51:54 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={r6, 0x7}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={r6, 0xa4}, &(0x7f0000000100)=0xc) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:54 executing program 0: [ 602.638975][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 602.644876][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:51:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/162, 0xa2}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}], 0x3) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000000040)=[{r4}], 0x1, 0x200) shutdown(r3, 0x0) shutdown(r1, 0x0) 07:51:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000380)=""/233, 0xe9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) fchmod(0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0xd172, 0x0, 0x0, 0x800e0050e) shutdown(r1, 0x0) [ 602.718981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 602.724828][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 602.730717][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 602.736490][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:51:54 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x0, 0x2}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fd\x00') fcntl$notify(r2, 0x402, 0x2c) fchown(r2, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000200), 0x4) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 07:51:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x100000000000000f}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff97, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/211, 0xdd}], 0x1, 0x0, 0x1f8}, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xcf1c, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) poll(&(0x7f00000000c0)=[{}, {}], 0x2, 0xff) shutdown(r3, 0x0) shutdown(r1, 0x0) 07:51:54 executing program 4: [ 603.170522][T13484] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.599051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 603.604882][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:51:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:55 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x28200, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x10182, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r3}) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:55 executing program 4: 07:51:55 executing program 3: 07:51:55 executing program 2: 07:51:55 executing program 3: 07:51:55 executing program 2: 07:51:55 executing program 4: 07:51:55 executing program 0: [ 603.874443][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 603.915861][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.923065][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:55 executing program 3: 07:51:55 executing program 2: 07:51:55 executing program 4: 07:51:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r4, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:56 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000080000000005) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4d04c0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000100)={0x6d, 0x0, &(0x7f00000006c0)}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x7fffffff) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f00000001c0)={0x9, "aa7c9b681347c90bfd1140cb067e45ed091979a9c4033dd3689f88b1f247c288", 0x700, 0x9, 0x6, 0x10, 0xf}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:56 executing program 0: 07:51:56 executing program 3: 07:51:56 executing program 2: 07:51:56 executing program 4: [ 604.277363][T14482] bridge0: port 1(bridge_slave_0) entered disabled state 07:51:56 executing program 4: 07:51:56 executing program 2: 07:51:56 executing program 3: 07:51:56 executing program 0: 07:51:56 executing program 2: 07:51:56 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x5f) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 604.659916][T14733] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.667099][T14733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.989534][T14637] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.055325][T14731] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.062555][T14731] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="0a7291fd325d7c25267c87cb02dc5dc2a42d265445d8b2d7e33ca875d77eda58738d0a3556e4391103e73c0f09768dc5cba7e7425a8fb7f57295839930e1fe2e9a4fd7f0eaf34fd9426ac98c0cf410ed4403495ff44c91c510d3493033ff84ab40ad747d46d44869b23eb33a3bdb545ea1e003ac3699b2c9cbe97895d880b6eb6a699f97be2431151b26e1586228bcf2f94f5e", 0x93}], 0x1, 0xfc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:56 executing program 3: 07:51:56 executing program 0: 07:51:56 executing program 4: 07:51:56 executing program 2: 07:51:56 executing program 1: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x7fffffff) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x6000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000180)={r3, 0x5}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000300)={r3, 0x1, &(0x7f00000001c0)=[0x5], &(0x7f0000000200)=[0x8, 0x4, 0x80000000, 0x3, 0x985, 0x1, 0x4, 0x4, 0x6], 0x62, 0x6, 0xfffffbff, &(0x7f0000000240)=[0x8000, 0x1, 0x2, 0x80000000, 0x10001, 0x9], &(0x7f00000002c0)=[0x0]}) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getresuid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:56 executing program 3: 07:51:56 executing program 4: 07:51:56 executing program 2: 07:51:56 executing program 0: 07:51:57 executing program 0: 07:51:57 executing program 4: [ 605.619107][T14860] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.689613][T14969] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.696845][T14969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.834692][T14860] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.903151][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 605.911817][ T9032] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.918959][ T9032] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:57 executing program 2: 07:51:57 executing program 3: 07:51:57 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x60080, 0x0) mmap$fb(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000000, 0x1010, r1, 0x20000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0xa0000000000000}, 0x28, 0x3) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:57 executing program 0: 07:51:57 executing program 4: 07:51:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x7fffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xfff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x4, 0xf, 0x4, 0x80}, &(0x7f00000001c0)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x5}}, 0x10) r4 = socket(0xa, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) sendfile(r6, r1, &(0x7f0000000380)=0x7ff, 0x6a0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getresuid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r12 = msgget(0x3, 0x21) r13 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r13}, {0x2, 0x5, r14}, {0x2, 0x5, r15}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) msgctl$IPC_SET(r12, 0x1, &(0x7f0000000080)={{0x8, r15, r11, r16, r11, 0x0, 0x1f}, 0xdb2, 0x61f8554, 0x1, 0xfa71, 0x1f, 0x4, 0x0, r10}) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000480)={0xa0, 0x0, 0x7, {{0x4, 0x1, 0xa00, 0xecb, 0x80, 0x2, {0x6, 0x8, 0x1, 0x8, 0x6, 0xad, 0x9, 0x8, 0x7f, 0x0, 0x2, r9, r11, 0xffff, 0x3}}, {0x0, 0x10}}}, 0xa0) bind$packet(r4, &(0x7f0000000040)={0x11, 0x19, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:57 executing program 3: 07:51:57 executing program 2: 07:51:57 executing program 4: 07:51:57 executing program 0: 07:51:57 executing program 4: 07:51:57 executing program 0: 07:51:57 executing program 3: 07:51:57 executing program 2: 07:51:58 executing program 4: 07:51:58 executing program 2: 07:51:58 executing program 0: [ 606.609538][T14987] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.753517][T14991] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.760678][T14991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.878990][ C0] net_ratelimit: 16 callbacks suppressed [ 606.878998][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 606.890499][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 606.896287][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 606.902090][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 606.938989][T14987] bridge0: port 1(bridge_slave_0) entered disabled state 07:51:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200100, 0x0) write$P9_RREAD(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="ac000000750100a100000094f96848b4c972cc0e04098294d3b86d051981680f45b826a12190bf5cf0fe4a2356acc82555e76f38920b468bf3f4bcce059183ad7158b9b9df0a5cf6a8a28973016aa7176c0360afeead77f9b0d8aaee2c3102911cc13ec40eb8a5999647753c8143f706d7a519ed812d91d4e1ce5095f3ff1dde923bf107ed184331ee0af6e1809808473a1e00000000000000000000eeffffff00d70c3df8dc9a0c308b0ea0f227bfa1dbcbbcaa8e4715c2ea17eb3fd9be9a00000000000000"], 0xac) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r9 = socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x2) sendfile(r9, r8, 0x0, 0x7fffffff) r10 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, 0x0) r11 = openat(r8, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x3d3fa3e674739d4e) ioctl$SG_GET_COMMAND_Q(r11, 0x2270, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bind$packet(r3, &(0x7f0000000040)={0x11, 0x19, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:58 executing program 3: 07:51:58 executing program 4: 07:51:58 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r1, 0x8010500d, &(0x7f0000000200)) sendfile(r4, r3, 0x0, 0x7fffffff) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f00000001c0)={0x0, 0x101, 0x9, [], &(0x7f0000000000)=0x4a}) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) getpgrp(r5) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 07:51:58 executing program 2: 07:51:58 executing program 0: 07:51:58 executing program 2: 07:51:58 executing program 3: 07:51:58 executing program 4: 07:51:58 executing program 0: 07:51:59 executing program 3: 07:51:59 executing program 0: [ 607.323708][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 607.365441][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.372658][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 607.608997][T15132] bridge0: port 1(bridge_slave_0) entered disabled state 07:51:59 executing program 4: 07:51:59 executing program 2: 07:51:59 executing program 3: 07:51:59 executing program 0: 07:51:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x9, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:51:59 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) mkdir(&(0x7f0000000000)='./file0\x00', 0x12) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000100)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:51:59 executing program 2: 07:51:59 executing program 4: 07:51:59 executing program 3: 07:51:59 executing program 0: [ 607.850119][T15267] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.857301][T15267] bridge0: port 1(bridge_slave_0) entered forwarding state 07:51:59 executing program 4: 07:51:59 executing program 0: 07:51:59 executing program 3: 07:51:59 executing program 2: 07:51:59 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) r2 = fcntl$getown(r1, 0x9) sched_getparam(r2, &(0x7f0000000100)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4) 07:51:59 executing program 0: [ 608.399013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 608.404888][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 608.410736][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 608.416510][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 608.418992][T15267] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.526837][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.535331][ T9032] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.542443][ T9032] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:00 executing program 0: 07:52:00 executing program 4: 07:52:00 executing program 3: 07:52:00 executing program 2: 07:52:00 executing program 1: 07:52:00 executing program 3: 07:52:00 executing program 1: 07:52:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x2002, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r5, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r7 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r7, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r9 = socket$netlink(0x10, 0x3, 0x0) sendfile(r9, r8, 0x0, 0x7fffffff) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r9, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1210000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r10, 0x200, 0x70bd2d, 0x7, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xf4075341ae1ac60d}, 0x22008080) sendmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r12 = socket$netlink(0x10, 0x3, 0x0) sendfile(r12, r11, 0x0, 0x7fffffff) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r14, 0xae60) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) r16 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="779ae800", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r17}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r15, 0x84, 0x71, &(0x7f0000000140)={r17, 0x7}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r11, 0x84, 0xf, &(0x7f0000000340)={r17, @in6={{0xa, 0x4e23, 0x4, @mcast1, 0xb6d3}}, 0x3, 0x3, 0x3, 0x9, 0x1f}, &(0x7f0000000a00)=0x98) writev(r7, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000000c0)={'caif0\x00', 0x1000}) 07:52:00 executing program 4: 07:52:00 executing program 2: 07:52:00 executing program 0: 07:52:00 executing program 2: 07:52:00 executing program 3: 07:52:00 executing program 4: 07:52:00 executing program 0: 07:52:00 executing program 1: [ 608.878952][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 608.884804][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:52:00 executing program 2: 07:52:00 executing program 4: 07:52:00 executing program 3: [ 609.299144][T15435] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400800, 0x4) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f0000000140)={0x84, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:01 executing program 0: 07:52:01 executing program 1: 07:52:01 executing program 4: 07:52:01 executing program 2: 07:52:01 executing program 3: 07:52:01 executing program 1: 07:52:01 executing program 3: 07:52:01 executing program 2: 07:52:01 executing program 4: 07:52:01 executing program 0: 07:52:01 executing program 4: [ 609.770174][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 609.778733][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.785870][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.047991][T15473] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:01 executing program 3: 07:52:01 executing program 2: 07:52:01 executing program 0: 07:52:01 executing program 1: 07:52:01 executing program 4: 07:52:01 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000280)="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", 0x1000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r9 = socket$netlink(0x10, 0x3, 0x0) sendfile(r9, r8, 0x0, 0x7fffffff) getsockopt$inet_sctp_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000140)) 07:52:01 executing program 1: 07:52:01 executing program 3: 07:52:01 executing program 4: 07:52:01 executing program 2: 07:52:01 executing program 0: 07:52:02 executing program 2: 07:52:02 executing program 3: 07:52:02 executing program 4: 07:52:02 executing program 0: 07:52:02 executing program 1: 07:52:02 executing program 4: 07:52:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slaveg0\x00', 0x1200}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) getgid() ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) r7 = syz_open_dev$ttys(0xc, 0x2, 0x1) sync_file_range(r7, 0x5, 0x1f, 0x5) 07:52:02 executing program 1: 07:52:02 executing program 3: 07:52:02 executing program 2: 07:52:02 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0xb490eec00a90b463}, 0x2) ftruncate(r1, 0x1000000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 07:52:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="0500000000000000fdffffff18e3a4bd9fa944da950b437ba9a3e30b4c234f3fedbc08d5cb9953e7341b022284bbbe1dbed889693c2f942a22a0658cde20c7ccb77d0a9a2093839f4225be9421df0a02e2", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000005fe8b5980000df00"], 0x48}}, 0x0) 07:52:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r2, r3, 0x0) ioctl$KVM_GET_CPUID2(r4, 0x4080aea2, &(0x7f0000000000)) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:52:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r4, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 610.845517][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.866178][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.873372][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='cryptd(sha224-generic)\x00', &(0x7f0000000080)='hash\x00'], &(0x7f0000000380)=[&(0x7f0000000100)='hash\x00', &(0x7f0000000140)='em1wlan1ppp0:/\x00', &(0x7f0000000180)='hash\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='wlan0systemvboxnet1:\':^usercpuset{/self:\xe2.user$\x00', &(0x7f0000000240)='eth1ppp1$vmnet0vmnet1ppp0\x00', &(0x7f0000000300)='cryptd(sha224-generic)\x00', &(0x7f0000000340)='\x00']) sendmsg$nl_generic(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x20008006) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r3, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000000)) r4 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$vsock_stream(r1, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000440)=@v1={0x1000000, [{0x5, 0x4}]}, 0xc, 0x3) [ 611.195600][T15537] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:03 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r17, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r17, 0x5402, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r16, @ANYRES32=r17], 0x3}, 0x1, 0x0, 0x0, 0x30000044}, 0x4) 07:52:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r4, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 611.393917][T15954] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[15954] [ 611.434563][T15954] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[15954] [ 611.550146][T15543] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$inet_smc(0x2b, 0x1, 0x0) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:03 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0xb490eec00a90b463}, 0x2) ftruncate(r1, 0x1000000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 07:52:03 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r17, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r17, 0x5402, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r16, @ANYRES32=r17], 0x3}, 0x1, 0x0, 0x0, 0x30000044}, 0x4) 07:52:03 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000100)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x22, &(0x7f00000001c0)=0x6, 0x4) 07:52:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) bind$packet(r4, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 611.811023][T16204] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16204] [ 611.918963][ C0] net_ratelimit: 10 callbacks suppressed [ 611.918972][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 611.930542][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:52:03 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r17, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r17, 0x5402, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r16, @ANYRES32=r17], 0x3}, 0x1, 0x0, 0x0, 0x30000044}, 0x4) 07:52:03 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000100)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x22, &(0x7f00000001c0)=0x6, 0x4) [ 612.114286][T16214] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.183135][T16423] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16423] [ 612.237365][T16423] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16423] 07:52:04 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ftruncate(r2, 0xffffffffffff07ed) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={r3, 0x81}, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 612.311196][T16393] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.318355][T16393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.375680][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 612.394154][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.401389][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:04 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r16, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r16, 0x5402, &(0x7f0000000000)) 07:52:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 612.527485][T16440] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16440] [ 612.559030][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 612.564879][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 612.570731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 612.576498][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:52:04 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0xb490eec00a90b463}, 0x2) ftruncate(r1, 0x1000000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) [ 612.869247][T16214] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.938424][T16435] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.945662][T16435] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:04 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000100)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x22, &(0x7f00000001c0)=0x6, 0x4) 07:52:04 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ftruncate(r2, 0xffffffffffff07ed) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={r3, 0x81}, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:52:04 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r16, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r16, 0x5402, &(0x7f0000000000)) 07:52:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) connect(r1, &(0x7f0000000140)=@rc={0x1f, {0x80, 0x0, 0x80, 0x8, 0xff, 0x9}, 0x5}, 0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x40096102, &(0x7f0000000280)={'syzkalle\xfe1\x00', {0x2, 0x0, @dev}}) r6 = syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r5, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c67c273868d2f9841c30000", @ANYRES16=r6, @ANYBLOB="00022bbda309b8629bfeecd1d7b10000200000000000fddbdf25050000000c00060001000000000000000c000400010000000000d33a"], 0x2c}, 0x1, 0x0, 0x0, 0x20040006}, 0x4002080) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r6, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r7 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bind$packet(r7, &(0x7f0000000040)={0x11, 0x19, r8, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 613.038968][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 613.044886][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 613.076082][T16675] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16675] [ 613.118961][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 613.124819][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 613.158436][T16500] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:04 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r16, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r16, 0x5402, &(0x7f0000000000)) 07:52:05 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000100)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0) 07:52:05 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ftruncate(r2, 0xffffffffffff07ed) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={r3, 0x81}, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 613.364799][T16793] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16793] [ 613.420785][T16793] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16793] 07:52:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r4, r3) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:05 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r16, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:05 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0xb490eec00a90b463}, 0x2) ftruncate(r1, 0x1000000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 07:52:05 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000100)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 613.761903][T16862] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[16862] 07:52:05 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ftruncate(r2, 0xffffffffffff07ed) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={r3, 0x81}, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) 07:52:05 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r16, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:05 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000100)) [ 614.046616][T16679] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:05 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ftruncate(r2, 0xffffffffffff07ed) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={r3, 0x81}, 0x8) [ 614.226155][T16788] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.233348][T16788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.508988][T17025] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.584709][T17033] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.591877][T17033] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0xf9, 0x3b, 0x5, 0xd66, 0x6, 0x210}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:06 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) 07:52:06 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) 07:52:06 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ftruncate(r2, 0xffffffffffff07ed) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) 07:52:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r4, r3) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) pipe(&(0x7f0000001400)) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) r1 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(r1, 0x0, 0x23b) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r3, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) futex(&(0x7f00000024c0), 0x8b, 0x0, &(0x7f0000002500), 0x0, 0x1) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x67, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x0, 0xffffffffffffff8f, 0x54}, 0x2c) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty=0x4c00}, {0x2, 0x4e20, @loopback}, {0x2, 0x0, @empty}, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffffff, 0x40}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\xf9\xff\xff\xff\xff\xff\xff\xff\x00', 0x3, 0x0, 0x1d}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x2, 0x46a, 0xf801}) lsetxattr$security_smack_transmute(&(0x7f0000001380)='./file0\x00', 0x0, &(0x7f0000002440)='TR\x02\x00', 0x4, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x400, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, 0x0, 0x0, 0x1) close(r6) splice(r5, 0x0, r6, 0x0, 0x100000000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000012c0)) sendmmsg(r3, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001280)={0xaa, 0x20}) 07:52:06 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ftruncate(r2, 0xffffffffffff07ed) 07:52:06 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) modify_ldt$write(0x1, &(0x7f0000000240)={0x6, 0x0, 0x0, 0x0, 0x1}, 0x10) 07:52:06 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 07:52:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r5, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r4, r3) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:06 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) 07:52:06 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) [ 615.229369][T17070] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.441910][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.452571][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.459715][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:07 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:07 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:52:07 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) 07:52:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r1 = socket(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r6 = socket$netlink(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x7fffffff) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fsetxattr$smack_xattr_label(r6, &(0x7f0000000180)='security.SMACK64IPIN\x00', &(0x7f00000001c0)={'smaps\x00'}, 0x7, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) pipe(&(0x7f0000001400)) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) r1 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(r1, 0x0, 0x23b) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r3, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) futex(&(0x7f00000024c0), 0x8b, 0x0, &(0x7f0000002500), 0x0, 0x1) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x67, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x0, 0xffffffffffffff8f, 0x54}, 0x2c) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty=0x4c00}, {0x2, 0x4e20, @loopback}, {0x2, 0x0, @empty}, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffffff, 0x40}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\xf9\xff\xff\xff\xff\xff\xff\xff\x00', 0x3, 0x0, 0x1d}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x2, 0x46a, 0xf801}) lsetxattr$security_smack_transmute(&(0x7f0000001380)='./file0\x00', 0x0, &(0x7f0000002440)='TR\x02\x00', 0x4, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x400, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, 0x0, 0x0, 0x1) close(r6) splice(r5, 0x0, r6, 0x0, 0x100000000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000012c0)) sendmmsg(r3, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001280)={0xaa, 0x20}) 07:52:07 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:07 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) 07:52:07 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) 07:52:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:07 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:07 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000200)) 07:52:07 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) 07:52:08 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:08 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 616.299455][T17435] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.424881][T17770] __report_access: 12 callbacks suppressed [ 616.424897][T17770] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[17770] [ 616.801630][T17435] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:08 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:08 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) 07:52:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) pipe(&(0x7f0000001400)) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) r1 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(r1, 0x0, 0x23b) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x802, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r3, &(0x7f0000000040)={0x11, 0x800000000000004, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) futex(&(0x7f00000024c0), 0x8b, 0x0, &(0x7f0000002500), 0x0, 0x1) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x67, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x0, 0xffffffffffffff8f, 0x54}, 0x2c) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @empty=0x4c00}, {0x2, 0x4e20, @loopback}, {0x2, 0x0, @empty}, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffffffffffffffff, 0x40}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\xf9\xff\xff\xff\xff\xff\xff\xff\x00', 0x3, 0x0, 0x1d}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x2, 0x46a, 0xf801}) lsetxattr$security_smack_transmute(&(0x7f0000001380)='./file0\x00', 0x0, &(0x7f0000002440)='TR\x02\x00', 0x4, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x400, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, 0x0, 0x0, 0x1) close(r6) splice(r5, 0x0, r6, 0x0, 0x100000000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000012c0)) sendmmsg(r3, &(0x7f0000000d00), 0x1bdd307, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0, 0x1, 0x0, 0x1}, 0x120) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001280)={0xaa, 0x20}) 07:52:08 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r15, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r1 = socket(0x11, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="48000000100005070000009353596fcc7f8b8d00", @ANYRES32=r7, @ANYBLOB="0000000000000000680012000c0001007665746800002a3f180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x5}, 0x1, 0x0, 0x0, 0x400cc}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x264, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000142e752c20f18900000200"/27, @ANYRES32=r7, @ANYBLOB="08000200fffffdbf"], 0x20}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000000104000000000000000002f100000000", @ANYRES32=r7, @ANYRESHEX=0x0], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', r7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r8, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:08 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) [ 616.975107][T17886] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[17886] [ 617.015376][T17886] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[17886] [ 617.044549][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 617.059792][ T9032] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.066962][ T9032] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:08 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:08 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 617.198975][ C1] net_ratelimit: 16 callbacks suppressed [ 617.198984][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 617.210483][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:52:08 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r9 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r9}, {0x2, 0x5, r10}, {0x2, 0x5, r11}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r12 = inotify_init1(0x0) fcntl$setown(r12, 0x8, 0xffffffffffffffff) fcntl$getownex(r12, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r13, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 07:52:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:09 executing program 0 (fault-call:11 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 617.278945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 617.284812][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 617.290685][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 617.296459][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:52:09 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:09 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 617.388585][T18107] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[18107] 07:52:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:09 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) write$UHID_CREATE(r1, &(0x7f00000011c0)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000001c0)=""/4096, 0x1000, 0x401, 0xfd26, 0x10001, 0x401, 0x4}, 0x120) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 617.766907][T17884] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000140)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x28002, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x90, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="f64c42ac4dbb63d9a84c946ce9f04294"}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="e2b7d2573bd739c79baeac8199e5e8f1"}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x9}}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x65526a19}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffeffff}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4800}, 0x4000) ioctl$TCSETSW(r5, 0x5403, &(0x7f00000000c0)={0x1, 0x6, 0x8000000, 0x1, 0x1b, 0x7, 0x4, 0x20, 0xea52590, 0x7, 0x0, 0xffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:09 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r9 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r9}, {0x2, 0x5, r10}, {0x2, 0x5, r11}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r12 = inotify_init1(0x0) fcntl$setown(r12, 0x8, 0xffffffffffffffff) fcntl$getownex(r12, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r13, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 07:52:09 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 07:52:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000140)={0x1, "bb85d62346509c8837e4cd5db10d68a55c49c66e2057c9d36bf4ffd92c8e94da"}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/221}, {&(0x7f00000002c0)=""/170}, {&(0x7f0000000380)=""/4096, 0xfffffffffffffe50}, {&(0x7f0000001400)=""/105, 0x2a6}], 0x5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:09 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 617.982153][T18339] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[18339] 07:52:09 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) 07:52:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast1, 0x6}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) process_vm_writev(r4, &(0x7f0000000080)=[{0x0, 0xffffffffffffffec}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x4b}], 0x1000000000000235, 0x0, 0x4bd, 0x0) tkill(r0, 0x1b) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r7 = gettid() setpgid(r6, r7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 618.029094][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.047661][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.054972][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:09 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 618.117632][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.153298][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.160587][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:09 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) [ 618.215473][T18454] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[18454] 07:52:09 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r9 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r9}, {0x2, 0x5, r10}, {0x2, 0x5, r11}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r12 = inotify_init1(0x0) fcntl$setown(r12, 0x8, 0xffffffffffffffff) fcntl$getownex(r12, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r13, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) [ 618.373823][T18543] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[18543] [ 618.604620][T18466] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.789006][T18346] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.808998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 618.814789][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 618.820635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 618.826379][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:52:10 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) 07:52:10 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) wait4(r2, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:10 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 618.943466][T18782] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[18782] [ 618.943517][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.969631][T18780] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[18780] 07:52:10 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) [ 618.999650][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.006859][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:10 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x4, &(0x7f0000000140)={0x0, 0x30, 0x2, @thr={&(0x7f00000001c0)="5dd295ebbe618f02e5609df81135ceb5db68d4c6daea194cfc675fb5349705ef7e2c025066e1bffe52378ee17f3227ccd11a0e7343c69fa370151d9ae96227e320814724bb67930225ab7a54e54fc155c6c944704a33416a5e18e0b73295920fcd255230c425d223436b910bbf270c9a27c1a92dd28c920cf39fc03b628ddeb71265f851a8bc361c092ea3b5b6a114d76002c41202cf1e4c6444d3316aae3315733427f91aff159e913ab5702831f4fec2b9b8889464a9a3b1fd4dbef38e8a5ba2e86b04b5a0ea55fdb8537d93e20ccd6d6abb54113b64df197ce60761122697799db77c656fbed33318b0f1420f9ebd93d7"}}, &(0x7f00000002c0)=0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000480), 0x1, 0x1) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f0000000380)={{r1, r2+10000000}, {r3, r4+30000000}}, &(0x7f00000003c0)) r5 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000400)={0x0, 0x0}) process_vm_writev(r8, &(0x7f0000000080)=[{0x0, 0x13c}, {0x0}, {&(0x7f0000000180)=""/63, 0x3f}], 0x3, 0x0, 0xffffffffffffffb0, 0x0) tkill(r5, 0x1b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) 07:52:10 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:10 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) [ 619.291793][T18900] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[18900] 07:52:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x100, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:11 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) pipe(&(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:11 executing program 4: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:11 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000100)={0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid=r15}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:11 executing program 0: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000280)=0x8, &(0x7f00000002c0)=0x2) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r1, 0x1b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000036c0)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f00000037c0)=0xe8) sendto$packet(r2, &(0x7f00000001c0)="0ff4a32cd68074f6a6ff76aae9d3068c9d5bc7d1b77943ba384fab8ad051ffa241642f8813f020b3cbdb65cb05de9877fab1858548a311d33ed91e3160fd9bfbd781f0077a", 0x45, 0x9400, &(0x7f0000003800)={0x11, 0x5, r4, 0x1, 0x8, 0x6, @dev={[], 0x21}}, 0x14) ptrace$cont(0x9, r1, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000240)={0x2}, 0x1) tkill(r1, 0xb) 07:52:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:11 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xd, 0xffffffffffffffff, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x80, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xfffffffffffffed7}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x200000) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000140)) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x800000000ac87, 0xf98, 0x0, 0x0, 0x1a, 0x8, "61f922d8f4d535ab443575d75e7f077d80c09923aed6e501ddbfabd080766007ee91dd9a3c51268f5c3edbd1670f06bc4848a25b861ade29ad63b400dff1e474", "c2ccc9a9bed4d06e952ca38437e60bc2f14a3d6cab34dff140c870a4e9acb7aa3f40016986ea6da94cf73ddf145c7b5dbc3d608bc36bc057cdb4293777fcad0d", "a30f1e66163a03e108bb14b024a17efcd8a9e1ec8ee58b31dad0f94f27ec9489", [0x3, 0x4874]}) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)=0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000003c0)={0x0, 0x9, 0x9, [0x1, 0x1272, 0x3, 0x2, 0x0, 0x80, 0xffff, 0x1, 0x3ff]}, &(0x7f0000000400)=0x1a) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000440)=@sack_info={r4, 0x10000000, 0x1}, 0xc) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r6 = socket$netlink(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x7fffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r5, 0x0, 0x12, &(0x7f0000000300)='/dev/input/mouse#\x00'}, 0x30) 07:52:11 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:11 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 619.900190][T18899] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:11 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:11 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) inotify_init1(0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:11 executing program 2: ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x1a59f) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 620.323523][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 620.337256][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.344411][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sched_getattr(r2, &(0x7f0000000000)={0x30}, 0x30, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:12 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r11}, {0x2, 0x5, r12}, {0x2, 0x5, r13}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:12 executing program 2: ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:12 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:12 executing program 2: ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:12 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r11 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000000)) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:12 executing program 2: syz_open_dev$admmidi(0x0, 0x0, 0x10000) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:12 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r11 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r11}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) [ 621.319041][T19479] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r6, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:13 executing program 2: syz_open_dev$admmidi(0x0, 0x0, 0x10000) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:13 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r6, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r5, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r8}, 0x30) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x6, 0x40) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r4, r3, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, r1, 0x0, 0x6, &(0x7f0000000140)='smaps\x00', r8}, 0x30) sendfile(r2, r1, 0x0, 0x7fffffff) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0xa0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 621.627709][T19621] __report_access: 8 callbacks suppressed [ 621.627745][T19621] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[19621] [ 621.651559][T19258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:52:13 executing program 2: syz_open_dev$admmidi(0x0, 0x0, 0x10000) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 621.672973][T19258] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.680146][T19258] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:13 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:13 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x80000, 0x0) write$FUSE_LK(r1, &(0x7f0000000140)={0x28, 0x0, 0x1, {{0x2, 0x100, 0x0, r0}}}, 0x28) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000001780)=[{&(0x7f0000000280)=""/61, 0x3d}, {&(0x7f0000001800)=""/45, 0x2d}, {&(0x7f0000000300)=""/205, 0x48f}, {&(0x7f0000000400)=""/131, 0x83}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/141, 0x8d}, {&(0x7f0000001580)=""/211, 0xd3}, {&(0x7f0000001680)=""/236, 0xec}], 0x8, 0x0, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x1, 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f0000000200)="4ec71c0163cc2da94722f2f3a7083b913b9ab15c89aa2c73b5d18cd3fd5457a2820ad319c4ce17ad358a86d95118bea241b9727e14578dcdd3d9a573ef8f2f5f472ff5910be22387788399f60850a01d5e2b201a86462eff36b615026b351ba2fdae6b1b", 0x64) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7fffffff, 0x4) syz_open_dev$tty20(0xc, 0x4, 0x0) 07:52:13 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:13 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 622.106472][T19816] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[19816] 07:52:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000280)) r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000240)=0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r5 = msgget(0x3, 0x21) r6 = getuid() socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="1a926300", @ANYRES32=r6, @ANYBLOB="02000500", @ANYRES32=r7, @ANYBLOB="02000500", @ANYRES32=r8, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040004000000000010000700000000002000000000000000"], 0x4c, 0x3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000080)={{0x8, r8, r4, r9, r4, 0x0, 0x1f}, 0xdb2, 0x61f8554, 0x1, 0xfa71, 0x1f, 0x4, 0x0, r3}) msgctl$IPC_RMID(r5, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r10 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c, 0x80800) fsetxattr$smack_xattr_label(r10, &(0x7f00000001c0)='security.SMACK64IPOUT\x00', &(0x7f0000000200), 0x1, 0x1) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) [ 622.318982][ C0] net_ratelimit: 16 callbacks suppressed [ 622.318991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 622.330516][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 622.349127][T19740] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:14 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) [ 622.525094][T20037] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[20037] 07:52:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000001c0)={0x2, 0x4, {0x0, 0x0, 0xffffff7f, 0x0, 0x8000}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:14 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$poke(0xa, r2, &(0x7f0000000140), 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000400)=""/4096) tkill(r0, 0x1b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$setregs(0x16, r5, 0x800200003, &(0x7f00000001c0)="5ea994c733233fb370dbc7340fd41632cfc518fd9d15d622b0e20d2beb3c4862461f540db8e504453aecd749d865a2b8d534cf8a5cc07414de9811165de832fe9e635ca2dcf86705311fd424bb97c744774aebba1942b334b2260522c714afec1900000000000000") ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) [ 622.711152][T20155] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[20155] 07:52:14 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 622.765533][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 622.780024][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.787193][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:14 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r10 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r10}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:14 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x10000, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f00000001c0)={0x3, [[0x45b, 0x40, 0xd499, 0x0, 0x3d9e, 0x7, 0xfff], [0xd01a, 0xffff8000, 0x5, 0x1000, 0x5, 0x401, 0xa499, 0x8], [0x401, 0x8001, 0x1, 0x1, 0x1, 0xfffffffc, 0xc9, 0x7]], [{0x4, 0x2, 0x5}, {0x2, 0x5, 0x6}, {0x5, 0x569, 0x8000}, {0x3, 0x2, 0x5}, {0xffff, 0x100, 0x1ff}, {0x6, 0x2, 0x400}, {0x100, 0xc15c, 0x7}, {0xff, 0x1, 0x80}, {0x88, 0x1f, 0x749b72b7}, {0x7, 0x80000001, 0x5}, {0x3036}, {0x39, 0x8001, 0x9}], 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) write$P9_RWSTAT(r3, &(0x7f0000000340)={0x7, 0x7f, 0x1}, 0x7) [ 623.014611][T20288] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[20288] 07:52:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1810000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x34, r2, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x808000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3057a69599742de996a659f2cc1700001d2e560069de0fc185276aeec04df53e", @ANYRES16=r2, @ANYBLOB="20002dbd7000fbdbdf250400000014000100000000000000000000000000000000000800030000020000"], 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x40000c0) r5 = socket(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) socket$inet6(0xa, 0x800, 0x35) accept$packet(0xffffffffffffffff, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bri\x06\x00e_slpve_0\x00', 0x0}) set_mempolicy(0x2, &(0x7f0000000340)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r10 = socket$netlink(0x10, 0x3, 0x0) sendfile(r10, r9, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x80000000004) prctl$PR_SVE_SET_VL(0x32, 0x1483e) bind$packet(r5, &(0x7f0000000040)={0x11, 0x19, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0x9fb1a18dd6bd3bec, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x17) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) inotify_init1(0x80000) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) tkill(r2, 0x20000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:14 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:14 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r10 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r10}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 623.292705][T20495] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[20495] 07:52:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:15 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 623.404049][T20536] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[20536] [ 623.438978][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 623.444855][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:52:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x8200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000001c0)={0x9, 0x29, 0x0, 0x6, 0x7f, 0x3ff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 623.518964][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 623.524814][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 623.530687][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 623.536451][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 623.699525][T20292] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:15 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:15 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r10 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid=r9}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r10}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 623.841147][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 623.849830][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.856899][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.912027][T20839] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[20839] [ 624.168989][T20478] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x11, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000)=0x66e1, 0x4) r3 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) wait4(r4, 0x0, 0x81000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 07:52:15 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r10 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r10}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000180)={0xffff, 0xa63, 0x5256, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:15 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 624.238079][T20861] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.245256][T20861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.337418][T20958] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[20958] [ 624.372035][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:52:16 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 624.391561][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.398728][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.406228][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 624.412057][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:52:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x100000000000026c, 0x0, 0x36b, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ioctl$KDSKBLED(r1, 0x4b65, 0x676) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x7fffffff) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10040500}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000071}, 0x4904) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:16 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r10 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r10}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 624.783825][T21212] ptrace attach of "/root/syz-executor.3"[9011] was attempted by "/root/syz-executor.3"[21212] [ 624.871400][T20964] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.088993][T21177] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.157814][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 625.166612][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.173727][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.267270][T20964] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.285661][T21100] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.292829][T21100] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) exit(0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:17 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000140)="0f34ab5f2c2d169a8ee1d97b446bcf8219c7a6c44e38055b1c7b2bbfde22", 0x1e}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 07:52:17 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r7, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000003c0)='$/}', 0xffffffffffffffff}, 0x30) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r10 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid=r8}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r10}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x8c, [], 0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000240)=""/140}, &(0x7f0000000000)=0x78) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x40) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:17 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) [ 625.527399][T21394] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:17 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r9 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r9}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$cont(0x18, r2, 0x6, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0x6, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:17 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 625.924149][T21459] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.931322][T21459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 626.316510][T21394] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\xcd\x00', 0x4000}) 07:52:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) 07:52:18 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r8 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r8}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:18 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpid() ptrace$setregs(0x8, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x7fffffff) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4142, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x4002, 0x0) ioctl$KVM_GET_MSRS(r4, 0xc008ae88, &(0x7f0000000280)=ANY=[@ANYBLOB="020000000000000000000000000012000000000000000000000000fe008000000100005ea202933c1e6fecf1c6cbf9301fb43c342460677dd6bd490ee6e02a314405186ae95d875a0a97ac07e97150cfd9cacd51a3a923cf188c09122f14af0e62fa54feb54c351876a5b6004d0df89d367d27f3c52665e4af20607c9619a3fb05c5b1e71595b9753321cbc73fc997702fcb648078e3e7942a567dd7d01079422c9e21425a8cdf672eed4f97"]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000000)={0x5, 'syz0\x00'}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x519282, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:18 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r8 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r8}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:18 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) [ 626.473551][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 626.498539][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.505732][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xffff, 0x400) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f0000000200)) read$usbfs(0xffffffffffffffff, &(0x7f0000000240), 0x0) r1 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x105000, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = getpgrp(r1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r1, 0x1b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) sched_setattr(r3, &(0x7f0000000240)={0x30, 0x3, 0x1, 0x0, 0x9, 0x1, 0x2, 0x8}, 0x0) 07:52:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) sendmmsg$alg(r7, &(0x7f0000002c00)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="b4305718c5a72676b4ffa922d96eb09d745aec66531e50d2b1b0d370daad05d46f1edd4577a2973c66146e47563910fcb78d5f6a5c08a5b811169f9b74e22cdc6598a5ab372e907a3bc4c7bff78be6daa2265562fb462ec27b069eede6cd29571ef615330ca181001713f5cb685d24ce01a4646133ebe11273f203a9c209dc182aedfdf8fa272d90", 0x88}], 0x1, &(0x7f0000000280)=[@iv={0xb0, 0x117, 0x2, 0x95, "0e4bb56627f23bf5a7f67f3d8b6c69b9c3b85b79c763e3804852183d3b498322a83bff7dc1aeb4a6661aa7af9fb39e9c99431c209155a1e1c76ca22846032b480dfb7caa46cc277d7b0c9d8d8e7dbe47e7949538b462a822a7fd9c09dfb59e4263787dfa6c3686e24872ec6d3ce3b645f97cfa9b5eec17550ef191761adf2c138974615967da2d7bf1d7f453d9b9538a7ee6abab73"}, @op={0x18}, @iv={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1000}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1128, 0x20040101}, {0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000013c0)="f76be8cc56e0d41decda14f4655539fb099b74824b1d0181f53e333b6180aecd56e34843b05f488670818fac3aa6a594f9e72101022838a7e96e8740e70e48fdc3dcf49b0a7947bea9d89e7ccf5cb86c5305c64c2e0cd72954ac28481738f79139b2bef8b53e093e2efe2676c590b38d4733ecb019ac33f5615e4659ac3c491c22fee4069b7fd34db7e6513c73ec044623f0d43f604d5ef368114e9153cd18a4b2cf53b3c8c4821850e91fdc8c675971ad79516960e889961e55a70aa5eb7e8839150b75af9ea473c8a3ba5832c5bc11958e8cce201b7353c4c1ef9cbe54d1f10e1e3eca13fce8e057f8ccc68f02950186303d", 0xf3}, {&(0x7f00000014c0)="f95a9e8eca57fc7bb7b28384533a099f57fe3b0196c3f4b8a68ba0ef656bc7c21d96d1d0829e9a72f5982d8d85bc1e6b2ebddcf5853d8452d683eec7f7f342578a16cf851fcbbc636281f53a4f5e2bd8174dc03be1db9b7c343e62254bbdac5e0fd6769a29ef54be81e7050273122529f6e19c5318223b70e5020d8821027cc1a860890183bfb62997cb8250fa1e1147167873cbcea886f774", 0x99}], 0x2, &(0x7f0000001580)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x18}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000015c0)="ec337d799b0e68323daa1e773e81b21777786f083b3b6a1ccb316541e21eff8d68f095021581b4ae3765fdc8795c039b162ba2cfdbf68f25b2abcf31ceaafa362e95355a8e37f20115e3256c8bb56c8f4b8c5d7019c53971256d991f055d4fd15c2d", 0x62}, {&(0x7f0000001640)="eae77bfe48a105d7995ab8a19d22c046b431966a0d0ebb22903cd6e3b2d05384eaa38fa0898947075b84b1a636f0b8c96d1a6439a6c99ea14f6740bf864b1c8bc2b45fc48a1e7dcb194fbb70f1e2e94aff52f6e46f2ca94af2a29e807cfcb08b8e8e458eb98a837a84be3026abeb20d08e79a3ea3e3be655ccd262c54719e218aebd655bbe91b2a352fc4749ef00e6fb0cb5b7ce", 0x94}, {&(0x7f0000001700)="e4c4c201c1a1383af5187cfa40b88e83b8fb6ad53a168829a1e326", 0x1b}, {&(0x7f0000001740)="e4d0353737f121b6a76d2fb101fbcf5878982d9338acc15d52f3486f2df0f85388fbac80f8826e64e38921176a7c29f8cec0050d0a479521fe47a8208bbf19b996f4bf3e7e301264dd478ff652a1ca961b12706fbe375bf24bb6ac9f90d3fa8681b6104c48f95d1465c67b9ee6f6537ba39d47f0b0584a3776914220a8f7619298a885d16e8099878ee98590fc1df93a2df9db28d200391925d9e6e2bf3017770ea2d00522ee126f2de47f0ef40b9c6f101b0fb6b964bb164ecc332a28013a27e7170836a32a5ee487e0a60e13cb79", 0xcf}, {&(0x7f0000001840)="dd490e", 0x3}, {&(0x7f0000001880)="179e02e36a21c7dcb3cc02027dd45e97b03cc8d7a832eb0d565e67a17021119818d363e46d3a7b27be90f7cb2193cb1bb3db41c41f96862ddd6cf238b4f89a813fa8f0ee672b939adbc9924ca480c339d11ec2f1f525643642b1b335fadb12d0ba7f36be9fb7b7a8ea7efbce70f77a129b99551153c86a3831d5767255f6a9816c1883fa121dd32fd8fd3170fc2628f1f56138614ec738f74ffa1314e75f2400e340bd0bc398a222ac71474127dfed809105c93522bedb86fe245ef161ba0df7f7a7aebf01218a925932562bfa2e2d9b1fb9c4ce5ebd78b87ce53c", 0xdb}, {&(0x7f0000001980)="8b352f7398b1a55e18ab2b33ab4c8d9d178c69d2b6d6b9c98ac46eee738de74a614f9d514dc1724d72420cce534489ceb039f8a360b6432fabe65a7ee551bdeec64180fb3b1bcd8ca217b7a150093ff09d0d48a461f229fbf406aa3815b5fb483fb73b846aba6709d4c2133239c49a7940b3645756ad53c3e9254d7f1c8e93ee6fc320cd2a77a8c41a9d5227767637bc7d4a0baf97b3b9df70462ca27a66a4aa0e023b3d7d7bb27d984e08660cad6476ac50ef9bc984f6e2754cc805916a1dbe847be53dd16551461bc1f3fc7b0b9656c3078905582887ed9170e2b27f5289bc01ecc73a2554f43c77717bbe62dc22731eea3e879e0061ccb8a5a5caa2146256217951cc5955a15844fa6f8c3285241bd8f1fbaa117fa7f8d9bc4872235ca4d7d48e1dacf35fcd1a5c236cf3bfe20e81d1ef3822e149de6b889f3ce8f62545c3e8d613de861fe75aa6ba882a84073fcf5df425000930266afcb232c6570a6efb07ebda7bce8af36323db1eb36eb9e05a2cc697e2927d86e17701c6f17c47ef88555852663bc1cf1ba09cf14f819963f2851fffe9a4d2aa94d171fbbac8e6984854951d6f9404ed34062ed7236d9cf96fc6c2de7d019c1238aa75bbfb9ec0a6fef8ecf8e08a31af897d51165a5235eae0f75599a72fc78bb67d5e73a73175e7a8277e87bfc3f8df3f957befde80ef4a04cf9c851d4b781d5e74a846f130b8d2cbf48b03c281b01d34fc91a3d63b9f3b8b4816db8a2da71dda5093f482a01ae4481bbc32b8b5d518491b862d8fb44b3b92586593e7e1151da8a15a47cbe5209c1b79c997e6e1e36b69fee1d29213f154735e0790d8ace4dd5f1223a0c45542cbcb058d67beb1af8e3f1528e5de13e4a7858771be905187547e2892ca9240560441a9ca18e5a304caf92383cf19360516a0c14dfbb21c7ef07a01fa1bd7a03e872933061b3b04725f4cab89124bc308d736559c397f61be00e23bb166edd968e439260246483869a6e7fbbea8f4c0393ae7b25c444f8eddf499aecbd032e9e5245aa41822c31fd78ba553d085e91e683164f3322e1e727dd74f85c21d6a44259a59070ad90298fdf6b5ad7d0f539f942f7f1ce427cc4677939381c4973441585dbf062d54acf07fed389b448f6f8d3771a850a5c18be03dc2a9bafe38ace23e083d7e1f9fb93bd652951a1c18aaa70894bb06b85035e742b0240fa3ac74a7754775edb0d3e92d4d3d225981b0d249795ea3bc0037793d58a768fb5d9a093ab7bc7c13a51eb1f01fa2b0a194868a744fd8d530e1ecf92e817053985f6bc63e7bc9fe76d42c81d203d997358a24a0dee00ee51e5906256b2adc5cfede4f6a563203df222f180809552224be5964d5a7b9c211ffbee4d8c6be4a1ee8c1b0243cafc2903f04c280115df99435a01a51cb4cd8a97aa402c796c96b5d164f8a4dd0b6b085fa11a1c22360b1de7d5de58a063e94611be587db9fab35a12a6878ae134593286c15c4b1fef60110e4971ee96a2b3955159fd583737b356b970febc1e574e09827d7648583bf7d5824aadcb99c2c42d7d9033cea315835c63e600d49637ad48947097ad1e50477acb6b37ae713e300908cc83a01914a288db54e0351ed2ec27a60efb8ed4f55a2c2ee29ed4f54764915e1a78cffc70ec7430be95f6cab116b529ec8c8cddd9aeb6e346bf27fb792ef280506acd866af63ebbad54e7ae3aaab13728617b7d4fa6af284e4bc624efeb88b50e0c0698f5dd34ab688eba52cabfb6bdb17a387dc91b76ea1b7dae72a524f83de3ab7dffe01d8fb8e5177bb8f53760caf95e00639f61617e6299b4e56a7ed0622349003802443ed8fe44bbef3eb77bb63612ebf4545923060d25d38e74e2c4584b165528ff28fafdbb4c907cf8e85de6d3862f55bff20893b1cf80a2917d8d4cb55f6d7025a0f021a421421de37854ae1b306d5e7280ee3444db3acde92faf06d6ed6c0497998f8704de7bc4070a306bde0752a807f83c3d145be91885ed7131f217a992b11ff5cc126d6d08d5cb3c7358160c8d619a3e25f249407743fcd710aeefdaf0f8ebffb12e1e09af5ff08dcd9d9f0da26a3d2bc6d6aa798f4414d6813aaff55107b6266501feef61a0b7acc306e92b188320e75de3c1260f405812b4dc811d2094de450ce0d7e1963f350c5580abc89e3d8990d85b3f2559b9e389465b5ba4c31165214f63693f18059860f363a3c9a58a3480146f4b9f278b6fd777a4839f47e8f637bf210f699e7a9de6c4a473176af8887c54ff6069554a738ff827000f8bec75d37d8c56ac8c0da9dd3e56c181a38b4398d6000cc1b607398a12f698ea5811dc9394cbcfbc7f271ba67053120d4b74a897d8f8f3652e779c5b9a69364e9a6b6ea1ad3bd07a30569f7feeb84a7fd59a86a23069de072fdd0338ccb726c92200ce0e1426d6df78248c8147b84c0e3b4863a75ae8dc9f37ef58f94a414db81254e31880b71bc94c6b7bcad57cc984faab23e508f3e6f436c64205c73bd6e59bf5075195e3ea8bd715f571ff41595ef6df4bb19bbc18c36ac521c56cc04e2223946c454e2d32ed5ff47b1ab1a7c6d8e469c08d7f9b299e2ef39e5d7eff7a4ccf82bedff8a3299e69d7321d98f1dcf168536fe0533ccf720ec372dbca70227307887831617c6b195e9cbb3e795637639eed4de43607313c070aee1bf07766f993f7ca1c971abbfc007d82ffc025d29d4ea134e290ca9f4e3161eb73f186b83afc746f96532599705e16d5833f10888bfe8c63f2637cbc731bbde3dc253e25ca95868ab84661bbfbeaa831a1540d14754ba2ff0242ff6194c897d3936825245095c4c7fabc29649096422fc4d751a3f5b01a81202cdc90244f39dcadbcfd265c361aa0fff77650efd9f1f2c55ddd48545726332d53df2461dfd3ed1610ef1c4a57d2cefcefa9b5c8136b42ef530bcdf08c60b0331bf8a6b22164dafc5551ad17e0aa80259f7e7a9b3ed6905164681a92dfe06a0cc3b9d928deb1e9f6ea1a0f0d8636986cc13b1e55b143dfd85c7638c0a08119408c9091c4d34225f199d4fafa84f41e9d479f364941af6bd18fa4410c83c877ee8bd2a9e3776044fa9443c52a8634e8f403a0343dc8df58a028749e133374e0c495b38efecad1a6ddaa3f101468646fd18eba193880b58b1222e6bfc955e92f50c8533361f3243244a7fce77c97184683ce02abe0bbe44e53f67a226fc53e6ca0f3bf9e931832adba3e0d903e512ecc3e5c0d56d08aeea9bb66076cfbf6ccbcd169d57d80bced3acf7c74966a65253457542abeac966c5524ce5ced4782cb8a29e5bc38fda77c549d3090b3e0457f7940ea37b1f32d9d3fb0791ed697c3148f89197662a16180ec579d3b4db687d741fff0be45a03ed423e938337905dcd1f83428e9fe791ad3093c98aa986c551cc6577dcf8de1c95e5cd7a950bdef5445819e38713d554cdffcead109f1008f32986081a57103bab98dddec71353d7de6253c20d32242f13bab23104af7959baba6523100dced8b76002023d1a2bf01b65895e8bff620336ed17b9989e043b11005b66b744f33df7613f27a8a8a262ddc0ae74e6d50ed42a7684fdaaeb51ee434d4bfc68d3feca9edb5ecdab6899ecac5112fab0870628e7ebacef98bc202827175034325c16828fe9e9ecc90f9d21d54277746c5bf774479ffbd59e2ad831c5ab646534a4cdf4fc7413bfed48663fac69fa61d8a6c012d0a4aecbd9f7b0ca26414870f6a663ca364464a34d58fa4ecbb0495df251025842bea34c8548dd0e8abdee7ddeea211d46db25c38669b24cd155fe2401481af56945aa2295678ae89d46b110ca31c7c2bdd315142fb9cc0f0e94f5c2a6ade5fc5a4b067f7fb7ecb741652e6773f38d386d1140799590ba826b4fc32f2d2c5b02fa1779a052edc37b3205390351f0947dfaf40612fea96740c390e91891557b6942470b8363fa5106b06c01e87729b19bc9b5780c478b1e893d4f96a73557bfabe40cb602bfadaf1f32aa6afd9c44101280990edb5b95527fba1d23d567687c49c6b33368bb41d90fa53e7e579f2a67b5b82cdf6378c5262c178fba9f5e1dd5511fd817f499f12d782b704eba3746af6efc6c5b0e41a9b61d96f457e5c7cfb2329ee23c2cecb4ff4ca111258b08dc1b681d950b891b5ac009c62c5b49416ec599e390ae2fcec46e09446564a1a0207af4c8654c3c0fffe4bb3096d74976f547dfd1834de9c90a224a832e9400a700b1d23e98de8ab71014bad7c4a7bd075b853a6900dacb221b560b4ed0c69f270b48f0e8c7910fab30e207d34be8c1162644627cc9a116b10fb15a6a4a980470a29127012025d297b6d22f68042e0e1a9c59c5557be77dbbc0e5d944a273a6b40430770ce70ff41dea9ecb84bc08f5fdff4747ff9852a77a5fd163801684db195aa673aa05dadc115ea3b6d054b3642dadff912b3d29894fcab46a79638c23735ce8742c7ea5c35c32ddd9ca3d6bff423d6e9659a95bf4cb62d2de34e7288942de52411b87cf063c8ad5d58e188592e700506207196aa9b3f48b86b52a918fee0f63c20ef64f9c7735041a733ec73c4860334a9977302634c0ca0bfc7906ceefdabf7d2335269a42c358edfbcd8c8652a958f390e2e563d2941e9e77c54285a82878cb168fc46135d56828614cf5c7e74201b23593ea267735187f4d855bb3f2dee9023592ddd0d07e1ec0ef5f0d3eb1559eec72089fa58a846d1494976ca201a8d4c6d696f57c0e7542502807d1a0d310072a8e858762e1e065d0d0bebf59e6917c423b06ab5150e1a095f4692f153195c4e9bab6893ed763655422d23c2b8edf48c946a44970156d53f1ba100ac27b3208cc81e38164700c521083343b0843534fef2f6785b6891de18dfb58bc8ff2be2718f54ef08b47159a7b130c7025bc4eb5098fe77de36fda20a31570caf0acc460829b25ebe88da5ae308bc2f8ff83f7ce30b7f58572d0eadd6000545ece9ea10c5e605f62124e4110f9fe215995636e1176889b6b01bd939de5cbd20e84f46ec25c5bc5be9326a3dfac8ec5ee95e86236c91882cff9255bf1491625ced2a839bdbb85827ca7dbf2c9a2ef8360b53f6227dd84509357b59f3e44d83c5573fd86e23ec7b161189864819121efa7f9ac1c00eff220953292c3e7391cb880d6802bf3f90bdc1d5d60023c0bdf8d6d9fb8c2bcc509e08921f4aa92ce5950e057c7e8a49e452d210531fa4798942db7bfc6acaa14b391d79e4f0fd7d7cc8c2a38078b9a4f88820fff165b8161a37f33d6ea9932d21ecf2b02e9ebcb6acfc7719dd2bce0e147b970ccad23449906a2943d4c95398d0140e9471a6a7e786ef6c13b3cf18d28d912e951d4a3c9124729dea1adf0e227e630659e9d24169e1284b34095b3d11990f3451ff54919530f5d62fc935730d053ab6135c82bbe52eb560237f51badd04048a904baf066eec21cf4bdad68b7e0f1ab1dbe6b34e0c46f7b0ab35e9856b8bf6ab466ebd43eb5091bc2fd9b7552f9cd8b1397ed018de2de16b78e3badce3682dc460c68ab4335be786c72b4692d288ce9adeddb7ec22c6bedcc1ff457ae2fcea98613a562be2766c5f2e2ff9caf7b353aaa2f7a744b709f65ce8acfced6389a3bf3b87eb4dfa8968ce511c984cdd55533d35fe1b7f075cbd295646bae82ec89a80e02654f40ed3c0cf2ff7c1b8527859129863a0114feaa10650f705562ba7082a55a546d7b02ada9fe048e8ce1bd905ec9736eb630c46a04b8d05fd409d776d6bbadb3379f2aab82a9708f4bbd60000ed6b4", 0x1000}, {&(0x7f0000002980)="2fc4da4d0fc1f4dacbf63e93eeda765b4914e455852ec44b64c5c6ba79ef9850674221eb925fbac6184053be6cff7b2ddee5c8106d21700fdf542a6c72f989b90988189fb66b5ed2aebe8b1e393acdad1ca7cdac9ff07277e7b952d66c685af5595b8d4b14ac7224b3ab089189dfa520b1b0cba20c821c34337f61003bb3e4a79763bb39f069e2da762d97524394fb066c5f475e7aa6d0bdc958306e857c66eefb611663653cbc7ed9b2729033611ec2d00238724e2728748ccd12c902acf81d993e1d63bae821baca55a6965b818199a82c61d02cbb1a69154b4820f4692b44478ed7e2069029db693f9f5e", 0xec}], 0x8, &(0x7f0000002b00)=[@assoc={0x18, 0x117, 0x4, 0xfffffffa}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xffffffff}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0xa39}, @op={0x18}], 0xf0, 0x80}], 0x3, 0x8010) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:18 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:18 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) inotify_init1(0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r7 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r7}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:18 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r9 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r9}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:18 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:18 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r7 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r7}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 626.916623][T21699] __report_access: 3 callbacks suppressed [ 626.934140][T21699] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[21699] 07:52:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000140)=0x65) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x7fffffff) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000000)={0x2, "db64"}, 0x3) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f00000001c0)={{0x8, @multicast1, 0x4e22, 0x1, 'lblc\x00', 0x8, 0x3, 0x32}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x2000, 0x40, 0x80000001, 0x2}}, 0x44) 07:52:18 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r5 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r3}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r5}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:18 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 627.355174][T21658] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:19 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r9 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r9}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 627.473701][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.486917][ T9032] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.494089][ T9032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.549636][T21903] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[21903] [ 627.598999][ C1] net_ratelimit: 16 callbacks suppressed [ 627.599009][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 627.604780][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 627.679033][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 627.684877][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 627.690746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 627.696514][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 627.702426][T21687] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r8 = socket$netlink(0x10, 0x3, 0x0) sendfile(r8, r7, 0x0, 0x7fffffff) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r10 = socket$netlink(0x10, 0x3, 0x0) sendfile(r10, r9, 0x0, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:19 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r9 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r9}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x4, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r3, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000000)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r5, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)) ppoll(&(0x7f0000000000)=[{r1, 0x8}, {r1, 0x5004}, {r3, 0x8}, {r4, 0x100}, {r5, 0x2204}], 0x5, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={0x2}, 0x8) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) process_vm_writev(r2, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffff47}, {&(0x7f0000000180)=""/63, 0x101dd}], 0x24f, 0x0, 0xfffffffffffffdd7, 0x0) getgroups(0x0, &(0x7f0000000000)) tkill(r0, 0x34) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) 07:52:19 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r5 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r3}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r5}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:19 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000280)={0x4, 'bpq0\x01#\x8b\xa7\b(\xad\x00', 0x4}, 0x63) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:19 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 627.870954][T22009] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[22009] [ 627.910245][T22015] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[22015] 07:52:19 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 627.963966][ T9023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.991797][ T9023] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.998969][ T9023] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:19 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 628.057336][T22021] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.064521][T22021] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:19 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000001c0)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 628.482937][T22236] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.559013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 628.564891][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 628.668985][T22021] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x201, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000140)=""/198, &(0x7f0000000280)=0xc6) r8 = getpgrp(0xffffffffffffffff) syz_open_procfs(r8, &(0x7f0000000340)='personality\x00') r9 = accept4$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0x800) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000080)={'veth0\x00', 0x22000000c0ffffff}) 07:52:20 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) getuid() 07:52:20 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:20 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) setpriority(0x2, r0, 0x401) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)) r3 = dup2(r1, r2) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r6 = getpgrp(r5) r7 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r7, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r7, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r9, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r9, 0x5402, &(0x7f0000000000)) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r10, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r10, 0x5402, &(0x7f0000000000)) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r12 = socket$netlink(0x10, 0x3, 0x0) sendfile(r12, r11, 0x0, 0x7fffffff) r13 = accept4$unix(r11, 0x0, &(0x7f0000000400), 0x40000) r14 = syz_open_dev$rtc(&(0x7f0000000440)='/dev/rtc#\x00', 0xbb52, 0x600) r15 = socket$inet_udp(0x2, 0x2, 0x0) r16 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r17 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r17}, {0x2, 0x5, r18}, {0x2, 0x5, r19}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r22 = msgget(0x3, 0x21) r23 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r23}, {0x2, 0x5, r24}, {0x2, 0x5, r25}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) msgctl$IPC_SET(r22, 0x1, &(0x7f0000000080)={{0x8, r25, r21, r26, r21, 0x0, 0x1f}, 0xdb2, 0x61f8554, 0x1, 0xfa71, 0x1f, 0x4, 0x0, r20}) r27 = inotify_init1(0x0) fcntl$setown(r27, 0x8, 0xffffffffffffffff) fcntl$getownex(r27, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r28, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r29 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r29, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r30 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r29, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r30}, {0x2, 0x5, r31}, {0x2, 0x5, r32}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000000600)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000000)="7a7081464ef5fcbb0a77a807cd465b5b70aed4061f51d532b31f87cbec20eb4350d8", 0x22}], 0x1, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r8}}}, @rights={{0x24, 0x1, 0x1, [r9, r10, r13, r14, r15]}}, @rights={{0x18, 0x1, 0x1, [r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r17, r21}}}, @cred={{0x1c, 0x1, 0x2, {r28, r30, r33}}}], 0xa0, 0x912}, 0x1) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r34, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregs(0xd, r34, 0x0, &(0x7f00000001c0)="26526fe9223e7732231455dd2363c637d5395bb7215b56bc47bc1198ef3a6cdb97661d61bdca798f212ce095f08683c522cbd6293aacc2988c179c805aca5cd1c9fda9f344b995ac5ccaec0be467537a565c327c4b2f8e9e1aa708f553e159b9da0f94e1a573d818fb3a903a6ff2af91ab03bdfbe6287c1215260398000a7b") ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xb}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x13a, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:20 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 628.792126][ T9020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 628.812682][T22359] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[22359] [ 628.823838][ T9020] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.831007][ T9020] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:20 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:20 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:20 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) getuid() 07:52:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0x2) 07:52:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000001c0)={[0x7, 0x6, 0xffffffffffffff25, 0x300000000000000, 0x0, 0x2, 0x7, 0xea, 0x3, 0x3, 0x3076, 0x7, 0xfff, 0x200, 0x81, 0x7], 0x2000, 0x10008}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:20 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:20 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 629.184453][T22482] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[22482] [ 629.198977][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 629.204778][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:52:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xd, 0xffffffffffffffff, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x408403, 0x0) write(r2, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x100000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd, 0x20000000}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r3, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000000)={0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x9}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000000)={0x0, 0xb2, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x400000, 0x0, 0xfffffffd}) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sched_rr_get_interval(r7, &(0x7f0000000140)) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) wait4(r0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={@local, 0x42}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x40000, 0x0) read$FUSE(r8, &(0x7f0000000400), 0x1000) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:21 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:21 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:21 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) getuid() 07:52:21 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) [ 629.483551][T22703] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[22703] [ 629.506493][T22703] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[22703] [ 629.632967][T22711] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[22711] [ 629.649363][T22478] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:21 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setopts(0x6, r2, 0x0, 0x2) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 629.838314][T19258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.853619][T22818] ptrace attach of "/root/syz-executor.0"[9004] was attempted by "/root/syz-executor.0"[22818] [ 629.864750][T19258] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.871897][T19258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 630.089045][T22531] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.153334][T22638] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.160503][T22638] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:21 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:21 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:21 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) ioctl$SNDCTL_DSP_POST(r1, 0x5008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000340)) r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000140)={r7, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r7, 0x6, 0xfff, 0x6}, 0x10) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bsg\x00', 0x1802, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r8, 0xc0845657, &(0x7f0000000a00)={0x0, @bt={0x1ff, 0xbf, 0x0, 0x1, 0x7a2, 0x0, 0x4, 0x4, 0x7, 0x200, 0x3, 0x3, 0x9, 0x7, 0xcde4b87056b4d51a, 0x10}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup2(r13, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) bind$packet(r10, &(0x7f0000000040)={0x11, 0x19, r11, 0x1, 0x0, 0x6, @link_local}, 0x14) r15 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r15, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r15, &(0x7f0000000100)={0x0, 0x354, &(0x7f00000001c0)=[{&(0x7f0000000080)='+', 0x1}], 0x1000000000000007}, 0x20008804) writev(r15, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r15, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) setsockopt$inet_tcp_TLS_RX(r10, 0x6, 0x2, &(0x7f0000000140)=@gcm_128={{0x303}, "f96a777a6e2e6926", "69bfdfea06b20fb0be294cd1be63666d", "290e9e42", "143f01127a1bdfab"}, 0x28) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) 07:52:22 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:22 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 630.350311][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 630.383558][ T9032] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.390789][ T9032] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:22 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) 07:52:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r1, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) vmsplice(r1, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r4, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r4, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r5, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xdb}], 0x1) r6 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r6, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r6, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000b00)={{{@in=@empty}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xffffff1a) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="48000000100005070000009353596fcc7f8b8d00", @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x264, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200002000000", @ANYRES32=r11, @ANYBLOB="08000200fffffdbf"], 0x20}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000000104000000000000000002f100000000", @ANYRES32=r11, @ANYBLOB="0800020000000000"], 0x20}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="48000000100005070000009353596fcc7f8b8d00", @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000180)={0x0, 0x264, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r16, @ANYBLOB="08000200fffffdbf"], 0x20}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000000104000000000000000002f100000000", @ANYRES32=r16, @ANYBLOB="0800020000000000"], 0x20}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x56, r16}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r1 = socket(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:22 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:22 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:22 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:22 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:22 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, 0x0, 0x0) 07:52:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) tkill(r3, 0x3e) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 631.003819][T23041] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.326752][T23063] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.338307][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 631.351809][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.358968][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 631.498286][T23058] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.508208][T23056] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.515375][T23056] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() ptrace$setsig(0x4203, r6, 0x1, &(0x7f0000000140)={0x17, 0x7f, 0xca8}) r7 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:23 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:23 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:23 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, 0x0, 0x0) 07:52:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x7fffffff) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xb8) r2 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r2, 0x1b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r3 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)="f315cac8848b93b46d6ebe3e90c457c6fe40baa8d7c7c5ad65eae8c0b45dd521b49b75af6d2a831d790aa5f19d8c80a4c169d779194ae73c8583464f7cfea95d7a040ce0afdbaee88fb23304e7a620aa", 0x50, r3) keyctl$invalidate(0x15, r4) 07:52:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r1 = socket(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:23 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 631.648739][T23400] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.655963][T23400] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:23 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, 0x0, 0x0) 07:52:23 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') r1 = socket(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) rt_sigaction(0x35, &(0x7f00000002c0)={&(0x7f0000000000)="c4c3e9cf0cb60c8f090096d6f3480f2c8a49f078468fe97801914200000045ffad63000000c4e185c25fa30f0f01e52ec034192485c7676466410f3a40f81a", {0x6}, 0x3, &(0x7f0000000140)="457f0c2ec038dac421fd7cbafeefffffc482ed8c830f0000000f4239c46319488bbd0c000065f3420f1c01c4c17e5bfac4024db78d6700000066460f380b4010"}, &(0x7f00000003c0)={&(0x7f0000000340)="430f91b200800000f30f1efb67430f99aeb9000000c4225997676b470f010c3bc4617b12efc4a2ed9c4704c4a26d9ce3660f3a40f0bac401b9169389000000", {}, 0x0, &(0x7f0000000380)="450f0fa854550000a0660f38337d000f38f0328f6a78105cf6323223333345806a0708c4817928dac421797ead2c207220360fae4a05dc34cf2e660f380219"}, 0x8, &(0x7f0000000a00)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000240)) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000001c0)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vhost-net\x00', 0x2, 0x0) r7 = eventfd2(0x8, 0x17c2694dc5a604e0) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f0000000a80)=r7) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregs(0x1c, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:23 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 632.170269][T23429] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.242365][T23512] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.249527][T23512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 632.331759][T23520] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:24 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) 07:52:24 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r4 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r4}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:24 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) rt_sigqueueinfo(r0, 0x1c, &(0x7f00000001c0)={0x4, 0x0, 0xffffffff}) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 632.508475][T23429] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:24 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r1, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:24 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) 07:52:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000000c0)={@local, 0x7c}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 632.719124][ C0] net_ratelimit: 20 callbacks suppressed [ 632.719132][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 632.730704][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:52:24 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 632.779914][T23843] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.787049][T23843] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:24 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r1, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 633.159038][T23758] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.223297][T23861] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.230499][T23861] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$netlink(0x10, 0x3, 0x0) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r9, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r9, 0x5402, &(0x7f0000000000)) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r10, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r10, 0x5402, &(0x7f0000000000)) sendfile(r9, r10, 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r8, 0x641f) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r11 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x40000, 0x0) connect$can_bcm(r11, &(0x7f0000000200), 0x10) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40, 0x0) ioctl$SNDCTL_DSP_POST(r12, 0x5008, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9, 0x100000002}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@mcast2, 0x43}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000002c0)={0x6, 0x7, 0x5181, 0x8000}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x4468e2d5c7940243, 0x100) r4 = socket$inet6(0xa, 0x3, 0x3c) r5 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r5, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) connect$inet6(r5, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000280)=0x3, 0x4) writev(r4, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) write$cgroup_pid(r3, &(0x7f0000000200)=r6, 0x12) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:25 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) 07:52:25 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r6 = inotify_init1(0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r7, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:25 executing program 3: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r2}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:25 executing program 3: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r2}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 633.406145][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.432116][ T9032] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.439360][ T9032] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:25 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:25 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558", 0x2f) 07:52:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@rand_addr=0x101, @in6=@remote, 0x4e22, 0x0, 0x4e24, 0x4, 0xa, 0x20, 0x80, 0x2e, r2, r5}, {0x6, 0x4, 0xc5, 0x81, 0x8000, 0xb7, 0x100000000, 0x81}, {0x7, 0x4, 0x1e000000000000, 0x7}, 0x80000001, 0x0, 0x0, 0x1, 0x6, 0x3}, {{@in6=@rand_addr="efdf14f18454d3b05ca74ea0d697feb8", 0x4d5, 0x6c}, 0xd, @in=@local, 0x3507, 0x4, 0x2, 0x40, 0x1d, 0x1ee007e5, 0x8}}, 0xe8) 07:52:25 executing program 3: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r2}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 633.838969][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 633.844796][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 633.919010][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 633.924888][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 633.930759][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 633.936543][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 633.939027][T23979] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.089027][T24094] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.160543][T24043] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.167669][T24043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.369033][T23979] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r7 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r7, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r7, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) getsockopt$SO_COOKIE(r7, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000280)=0x8) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x410000, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r8, 0x11b, 0x6, &(0x7f0000000140)=0x210842, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_VRING_ERR(r8, 0x4008af22, &(0x7f00000001c0)={0x1}) sendfile(r10, r9, 0x0, 0x7fffffff) ioctl$VIDIOC_S_SELECTION(r9, 0xc040565f, &(0x7f0000000180)={0x6, 0x1, 0x4, {0xffffff61, 0x2, 0x3, 0x100}}) [ 634.424951][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 634.433674][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.440790][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:26 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:26 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x1) 07:52:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x8) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x10080) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r5 = socket$netlink(0x10, 0x3, 0x0) sendfile(r5, r4, 0x0, 0x7fffffff) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r3, r4}) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:26 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r2}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:26 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r2}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:26 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 634.540227][T11482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 634.559141][T11482] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.566307][T11482] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:26 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x1) 07:52:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="48000000100005070000009353596fcc7f8b8d00", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x264, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r5, @ANYBLOB="08000200fffffdbf"], 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000000104000000000000000002f100000000", @ANYRES32=r5, @ANYBLOB="0800020000000000"], 0x20}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000ac0)={@local, 0x43, r5}) r6 = inotify_init1(0x0) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) fcntl$getownex(r7, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) fcntl$setown(r6, 0x8, r8) r9 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) keyctl$revoke(0x3, r9) keyctl$assume_authority(0x10, r9) fcntl$getownex(r6, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r10, &(0x7f0000000c40)=[{&(0x7f0000000a00)=""/80}, {&(0x7f0000000a80)=""/31}, {&(0x7f0000000cc0)=""/107}, {&(0x7f0000000b40)=""/154}, {&(0x7f0000000c00)=""/19}], 0x100001f1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0xffffffffffffffe0}], 0x25b, 0x0) ptrace$setopts(0x4206, r10, 0xfffffffffffffffe, 0xe) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) tkill(r11, 0x1b) r12 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r13 = socket$netlink(0x10, 0x3, 0x0) sendfile(r13, r12, 0x0, 0x7fffffff) r14 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r14, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r14, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r14, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f0000000480)={r14}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)=""/227, 0xe3}, {}], 0x2, &(0x7f0000000340)=""/214, 0xd6}, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:26 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x1) [ 634.798995][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 634.804873][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 635.097528][T24220] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.109909][T24235] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.117087][T24235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.237905][T24251] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.418982][T24220] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.481866][T24328] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.489025][T24328] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:27 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r3}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:27 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r2 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r2}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@known='com.apple.system.Security\x00', &(0x7f00000001c0)=""/242, 0xf2) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:27 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) 07:52:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:27 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) [ 635.606543][T24458] __report_access: 4 callbacks suppressed [ 635.606558][T24458] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[24458] [ 635.636914][T16669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:52:27 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000000500000009000000000000000000106cf4aa4ac99e8d000000006c6f000000000000000000000000000100000000000000000000000010000010010000000000000000000000a85f001a4b0000000000000005000000aaaaaaaaaa0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) recvmmsg(r1, &(0x7f0000002900)=[{{&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000000)=""/26, 0x1a}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000001380)=""/96, 0x60}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x6, &(0x7f0000002480)=""/153, 0x99}, 0x8}, {{&(0x7f0000002540)=@ipx, 0x80, &(0x7f0000002840)=[{&(0x7f0000000140)=""/34, 0x22}, {&(0x7f00000025c0)=""/194, 0xc2}, {&(0x7f00000026c0)=""/130, 0x82}, {&(0x7f0000002780)=""/2, 0x2}, {&(0x7f00000027c0)=""/96, 0x60}], 0x5, &(0x7f00000028c0)=""/29, 0x1d}, 0x8}], 0x2, 0x2100, &(0x7f0000002980)) ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x2ff}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 635.670151][T16669] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.677296][T16669] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:27 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) 07:52:27 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 636.055353][T24461] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.067914][T24511] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.075130][T24511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.209002][T24580] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.379150][T24461] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:28 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$netlink(0x10, 0x3, 0x0) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r9, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r9, 0x5402, &(0x7f0000000000)) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r10, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r10, 0x5402, &(0x7f0000000000)) sendfile(r9, r10, 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r8, 0x641f) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r11 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x40000, 0x0) connect$can_bcm(r11, &(0x7f0000000200), 0x10) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40, 0x0) ioctl$SNDCTL_DSP_POST(r12, 0x5008, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9, 0x100000002}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:28 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r3}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4200, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 636.435565][T24683] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.442719][T24683] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="90a0fc3cda8d4bbd582560b01c15a77ddc36670714ff4897c3378d739c1d57357ee88aef0685533d37593fb58285de655362c8d7ab7a4a07f4cd80023feee4d857108f6f151532cf1d687c79354eff9608579357d1593c362f45faaac34c56db55a2a2a3eaab87e53ddccee834b6f27426ef6fdc4be1e2470f46c584d52ca6388232998435db341c4f2e6f16e249ed652859a35ae18c637b28cf8e80b9c0f49ced48c3307e7680ad01bfec782a4f37115e4e96207bf8ae24bea4c33937a64c6120f6310bb9bd9da22848cc5821f6940e6ea8ab4d", 0xd4, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5, r5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r8 = msgget(0x3, 0x21) r9 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r9}, {0x2, 0x5, r10}, {0x2, 0x5, r11}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) msgctl$IPC_SET(r8, 0x1, &(0x7f0000000080)={{0x8, r11, r7, r12, r7, 0x0, 0x1f}, 0xdb2, 0x61f8554, 0x1, 0xfa71, 0x1f, 0x4, 0x0, r6}) keyctl$chown(0x4, r2, r5, 0xee00) r13 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup2(r16, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) bind$packet(r13, &(0x7f0000000040)={0x11, 0x19, r14, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 636.519479][T24688] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[24688] [ 636.547069][ T9020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 636.555837][ T9020] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.563021][ T9020] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:28 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:28 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(0x0, &(0x7f00000003c0)) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r3}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:28 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 636.933683][T24891] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[24891] 07:52:28 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 637.221469][T24697] bridge0: port 1(bridge_slave_0) entered disabled state [ 637.490886][T24759] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.497977][T24759] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:29 executing program 2 (fault-call:4 fault-nth:0): syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x1) 07:52:29 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:29 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:29 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 637.629802][T25028] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25028] [ 637.823504][T25136] FAULT_INJECTION: forcing a failure. [ 637.823504][T25136] name failslab, interval 1, probability 0, space 0, times 0 [ 637.869101][T25136] CPU: 0 PID: 25136 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 637.877840][T25136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.887921][T25136] Call Trace: [ 637.891267][T25136] dump_stack+0x197/0x210 [ 637.895661][T25136] should_fail.cold+0xa/0x15 [ 637.900282][T25136] ? fault_create_debugfs_attr+0x180/0x180 [ 637.906117][T25136] ? ___might_sleep+0x163/0x2c0 [ 637.910998][T25136] __should_failslab+0x121/0x190 [ 637.915962][T25136] should_failslab+0x9/0x14 [ 637.920477][T25136] __kmalloc+0x2e0/0x770 [ 637.924734][T25136] ? mutex_trylock+0x264/0x2f0 [ 637.929559][T25136] ? tty_write_lock+0x23/0x90 [ 637.934252][T25136] ? tty_write+0x58e/0x7f0 [ 637.938684][T25136] tty_write+0x58e/0x7f0 [ 637.942953][T25136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.949203][T25136] ? n_tty_read+0x1bf0/0x1bf0 [ 637.953892][T25136] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 637.959197][T25136] __vfs_write+0x8a/0x110 [ 637.959241][T24697] bridge0: port 1(bridge_slave_0) entered disabled state [ 637.963541][T25136] ? put_tty_driver+0x20/0x20 [ 637.963594][T25136] vfs_write+0x268/0x5d0 [ 637.979527][T25136] ksys_write+0x14f/0x290 [ 637.983882][T25136] ? __ia32_sys_read+0xb0/0xb0 [ 637.988665][T25136] ? do_syscall_64+0x26/0x790 [ 637.993354][T25136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.998947][ C1] net_ratelimit: 16 callbacks suppressed [ 637.998955][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 637.999426][T25136] ? do_syscall_64+0x26/0x790 [ 638.005110][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 638.010760][T25136] __x64_sys_write+0x73/0xb0 [ 638.010782][T25136] do_syscall_64+0xfa/0x790 [ 638.010809][T25136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.036118][T25136] RIP: 0033:0x45a909 [ 638.040020][T25136] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.059648][T25136] RSP: 002b:00007ff2a7d36c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 638.068064][T25136] RAX: ffffffffffffffda RBX: 00007ff2a7d36c90 RCX: 000000000045a909 [ 638.076044][T25136] RDX: 0000000000000001 RSI: 0000000020f03f44 RDI: 0000000000000004 [ 638.084021][T25136] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 638.092002][T25136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2a7d376d4 [ 638.099980][T25136] R13: 00000000004c7ca0 R14: 00000000004e4d08 R15: 0000000000000005 [ 638.108504][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 638.114357][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 638.120270][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 638.126051][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:52:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7fffffff) ioctl$sock_bt_cmtp_CMTPCONNADD(r6, 0x400443c8, &(0x7f00000000c0)={r2, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @dev={[], 0x1c}}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:29 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:29 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:29 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid=r4}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:30 executing program 2 (fault-call:4 fault-nth:1): syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x1) [ 638.342243][T25146] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25146] [ 638.344682][T25151] FAULT_INJECTION: forcing a failure. [ 638.344682][T25151] name failslab, interval 1, probability 0, space 0, times 0 [ 638.365228][T25151] CPU: 1 PID: 25151 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 638.373894][T25151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.383947][T25151] Call Trace: [ 638.387236][T25151] dump_stack+0x197/0x210 [ 638.391569][T25151] should_fail.cold+0xa/0x15 [ 638.396161][T25151] ? fault_create_debugfs_attr+0x180/0x180 [ 638.399497][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env [ 638.401969][T25151] ? __kasan_check_read+0x11/0x20 [ 638.414094][T25151] __should_failslab+0x121/0x190 [ 638.418679][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 638.419031][T25151] should_failslab+0x9/0x14 [ 638.419043][T25151] __kmalloc+0x71/0x770 [ 638.419064][T25151] ? mark_held_locks+0xf0/0xf0 [ 638.429485][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 638.431506][T25151] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 638.431524][T25151] __tty_buffer_request_room+0x1fb/0x5c0 [ 638.437059][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.440399][T25151] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 638.440413][T25151] pty_write+0x133/0x200 [ 638.440429][T25151] n_tty_write+0xb1d/0x1080 [ 638.450617][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 638.456354][T25151] ? lock_downgrade+0x920/0x920 [ 638.495898][T25151] ? n_tty_read+0x1bf0/0x1bf0 [ 638.500583][T25151] ? prepare_to_wait_exclusive+0x320/0x320 [ 638.506393][T25151] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.512633][T25151] ? _copy_from_user+0x12c/0x1a0 [ 638.517583][T25151] tty_write+0x496/0x7f0 [ 638.521831][T25151] ? n_tty_read+0x1bf0/0x1bf0 [ 638.526510][T25151] __vfs_write+0x8a/0x110 [ 638.530852][T25151] ? put_tty_driver+0x20/0x20 [ 638.535535][T25151] vfs_write+0x268/0x5d0 [ 638.539780][T25151] ksys_write+0x14f/0x290 [ 638.544117][T25151] ? __ia32_sys_read+0xb0/0xb0 [ 638.548885][T25151] ? do_syscall_64+0x26/0x790 [ 638.553564][T25151] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.559632][T25151] ? do_syscall_64+0x26/0x790 [ 638.564312][T25151] __x64_sys_write+0x73/0xb0 [ 638.568906][T25151] do_syscall_64+0xfa/0x790 [ 638.573418][T25151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.579304][T25151] RIP: 0033:0x45a909 [ 638.583199][T25151] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.602799][T25151] RSP: 002b:00007ff2a7d36c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 638.611212][T25151] RAX: ffffffffffffffda RBX: 00007ff2a7d36c90 RCX: 000000000045a909 [ 638.619183][T25151] RDX: 0000000000000001 RSI: 0000000020f03f44 RDI: 0000000000000004 [ 638.627154][T25151] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 638.635122][T25151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2a7d376d4 [ 638.643091][T25151] R13: 00000000004c7ca0 R14: 00000000004e4d08 R15: 0000000000000005 [ 638.651079][ C1] [ 638.651085][ C1] ====================================================== [ 638.651089][ C1] WARNING: possible circular locking dependency detected [ 638.651093][ C1] 5.5.0-rc1-syzkaller #0 Not tainted [ 638.651098][ C1] ------------------------------------------------------ [ 638.651102][ C1] syz-executor.2/25151 is trying to acquire lock: [ 638.651105][ C1] ffffffff8999aa80 (console_owner){-.-.}, at: vprintk_emit+0x3fd/0x700 [ 638.651118][ C1] [ 638.651122][ C1] but task is already holding lock: [ 638.651125][ C1] ffff8880a92da940 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 638.651139][ C1] [ 638.651143][ C1] which lock already depends on the new lock. [ 638.651145][ C1] [ 638.651148][ C1] [ 638.651152][ C1] the existing dependency chain (in reverse order) is: [ 638.651154][ C1] [ 638.651156][ C1] -> #2 (&(&port->lock)->rlock){-.-.}: [ 638.651168][ C1] _raw_spin_lock_irqsave+0x95/0xcd [ 638.651172][ C1] tty_port_tty_get+0x24/0x100 [ 638.651176][ C1] tty_port_default_wakeup+0x16/0x40 [ 638.651180][ C1] tty_port_tty_wakeup+0x57/0x70 [ 638.651183][ C1] uart_write_wakeup+0x46/0x70 [ 638.651186][ C1] serial8250_tx_chars+0x495/0xaf0 [ 638.651190][ C1] serial8250_handle_irq.part.0+0x2a2/0x330 [ 638.651195][ C1] serial8250_default_handle_irq+0xc0/0x150 [ 638.651198][ C1] serial8250_interrupt+0xf1/0x1a0 [ 638.651202][ C1] __handle_irq_event_percpu+0x15d/0x970 [ 638.651206][ C1] handle_irq_event_percpu+0x74/0x160 [ 638.651210][ C1] handle_irq_event+0xa7/0x134 [ 638.651213][ C1] handle_edge_irq+0x25e/0x8d0 [ 638.651216][ C1] do_IRQ+0xde/0x280 [ 638.651219][ C1] ret_from_intr+0x0/0x36 [ 638.651223][ C1] _raw_spin_unlock_irqrestore+0x90/0xe0 [ 638.651226][ C1] uart_write+0x3b6/0x6f0 [ 638.651229][ C1] n_tty_write+0x40e/0x1080 [ 638.651233][ C1] tty_write+0x496/0x7f0 [ 638.651236][ C1] redirected_tty_write+0xb2/0xc0 [ 638.651240][ C1] __vfs_write+0x8a/0x110 [ 638.651243][ C1] vfs_write+0x268/0x5d0 [ 638.651246][ C1] ksys_write+0x14f/0x290 [ 638.651250][ C1] __x64_sys_write+0x73/0xb0 [ 638.651253][ C1] do_syscall_64+0xfa/0x790 [ 638.651258][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.651260][ C1] [ 638.651262][ C1] -> #1 (&port_lock_key){-.-.}: [ 638.651275][ C1] _raw_spin_lock_irqsave+0x95/0xcd [ 638.651279][ C1] serial8250_console_write+0x253/0x9a0 [ 638.651282][ C1] univ8250_console_write+0x5f/0x70 [ 638.651286][ C1] console_unlock+0xb7a/0xf00 [ 638.651289][ C1] vprintk_emit+0x2a0/0x700 [ 638.651292][ C1] vprintk_default+0x28/0x30 [ 638.651296][ C1] vprintk_func+0x7e/0x189 [ 638.651299][ C1] printk+0xba/0xed [ 638.651302][ C1] register_console+0x745/0xb50 [ 638.651306][ C1] univ8250_console_init+0x3e/0x4b [ 638.651310][ C1] console_init+0x461/0x67b [ 638.651313][ C1] start_kernel+0x653/0x943 [ 638.651317][ C1] x86_64_start_reservations+0x29/0x2b [ 638.651321][ C1] x86_64_start_kernel+0x77/0x7b [ 638.651324][ C1] secondary_startup_64+0xa4/0xb0 [ 638.651327][ C1] [ 638.651329][ C1] -> #0 (console_owner){-.-.}: [ 638.651342][ C1] __lock_acquire+0x2596/0x4a00 [ 638.651345][ C1] lock_acquire+0x190/0x410 [ 638.651349][ C1] vprintk_emit+0x43a/0x700 [ 638.651353][ C1] vprintk_default+0x28/0x30 [ 638.651356][ C1] vprintk_func+0x7e/0x189 [ 638.651359][ C1] printk+0xba/0xed [ 638.651363][ C1] should_fail+0x708/0x852 [ 638.651367][ C1] __should_failslab+0x121/0x190 [ 638.651371][ C1] should_failslab+0x9/0x14 [ 638.651374][ C1] __kmalloc+0x71/0x770 [ 638.651378][ C1] __tty_buffer_request_room+0x1fb/0x5c0 [ 638.651382][ C1] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 638.651385][ C1] pty_write+0x133/0x200 [ 638.651388][ C1] n_tty_write+0xb1d/0x1080 [ 638.651391][ C1] tty_write+0x496/0x7f0 [ 638.651394][ C1] __vfs_write+0x8a/0x110 [ 638.651397][ C1] vfs_write+0x268/0x5d0 [ 638.651401][ C1] ksys_write+0x14f/0x290 [ 638.651404][ C1] __x64_sys_write+0x73/0xb0 [ 638.651408][ C1] do_syscall_64+0xfa/0x790 [ 638.651412][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.651414][ C1] [ 638.651417][ C1] other info that might help us debug this: [ 638.651419][ C1] [ 638.651422][ C1] Chain exists of: [ 638.651424][ C1] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 638.651441][ C1] [ 638.651444][ C1] Possible unsafe locking scenario: [ 638.651447][ C1] [ 638.651450][ C1] CPU0 CPU1 [ 638.651453][ C1] ---- ---- [ 638.651456][ C1] lock(&(&port->lock)->rlock); [ 638.651482][ C1] lock(&port_lock_key); [ 638.651490][ C1] lock(&(&port->lock)->rlock); [ 638.651498][ C1] lock(console_owner); [ 638.651505][ C1] [ 638.651508][ C1] *** DEADLOCK *** [ 638.651510][ C1] [ 638.651514][ C1] 5 locks held by syz-executor.2/25151: [ 638.651516][ C1] #0: ffff88808daa8090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 638.651532][ C1] #1: ffff88808daa8118 (&tty->atomic_write_lock){+.+.}, at: tty_write_lock+0x23/0x90 [ 638.651548][ C1] #2: ffff88808daa82a0 (&tty->termios_rwsem){++++}, at: n_tty_write+0x1b5/0x1080 [ 638.651563][ C1] #3: ffffc90004465360 (&ldata->output_lock){+.+.}, at: n_tty_write+0xadd/0x1080 [ 638.651580][ C1] #4: ffff8880a92da940 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 638.651596][ C1] [ 638.651598][ C1] stack backtrace: [ 638.651604][ C1] CPU: 1 PID: 25151 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 638.651611][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.651613][ C1] Call Trace: [ 638.651617][ C1] dump_stack+0x197/0x210 [ 638.651621][ C1] print_circular_bug.isra.0.cold+0x163/0x172 [ 638.651624][ C1] check_noncircular+0x32e/0x3e0 [ 638.651628][ C1] ? print_circular_bug.isra.0+0x230/0x230 [ 638.651632][ C1] ? print_circular_bug.isra.0+0x230/0x230 [ 638.651636][ C1] ? debug_smp_processor_id+0x33/0x18a [ 638.651639][ C1] ? alloc_list_entry+0xc0/0xc0 [ 638.651643][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.651647][ C1] ? find_first_zero_bit+0x9a/0xc0 [ 638.651651][ C1] __lock_acquire+0x2596/0x4a00 [ 638.651655][ C1] ? __lockdep_free_key_range+0x120/0x120 [ 638.651658][ C1] ? mark_held_locks+0xf0/0xf0 [ 638.651661][ C1] lock_acquire+0x190/0x410 [ 638.651665][ C1] ? vprintk_emit+0x3fd/0x700 [ 638.651668][ C1] vprintk_emit+0x43a/0x700 [ 638.651671][ C1] ? vprintk_emit+0x3fd/0x700 [ 638.651675][ C1] vprintk_default+0x28/0x30 [ 638.651678][ C1] vprintk_func+0x7e/0x189 [ 638.651681][ C1] printk+0xba/0xed [ 638.651685][ C1] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 638.651689][ C1] ? __lock_acquire+0x16f2/0x4a00 [ 638.651692][ C1] ? kernel_text_address+0x73/0xf0 [ 638.651696][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.651700][ C1] ? ___ratelimit+0x60/0x595 [ 638.651703][ C1] should_fail+0x708/0x852 [ 638.651707][ C1] ? fault_create_debugfs_attr+0x180/0x180 [ 638.651717][ C1] ? __kasan_check_read+0x11/0x20 [ 638.651721][ C1] __should_failslab+0x121/0x190 [ 638.651724][ C1] should_failslab+0x9/0x14 [ 638.651728][ C1] __kmalloc+0x71/0x770 [ 638.651731][ C1] ? mark_held_locks+0xf0/0xf0 [ 638.651735][ C1] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 638.651739][ C1] __tty_buffer_request_room+0x1fb/0x5c0 [ 638.651743][ C1] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 638.651746][ C1] pty_write+0x133/0x200 [ 638.651749][ C1] n_tty_write+0xb1d/0x1080 [ 638.651752][ C1] ? lock_downgrade+0x920/0x920 [ 638.651755][ C1] ? n_tty_read+0x1bf0/0x1bf0 [ 638.651759][ C1] ? prepare_to_wait_exclusive+0x320/0x320 [ 638.651763][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.651767][ C1] ? _copy_from_user+0x12c/0x1a0 [ 638.651770][ C1] tty_write+0x496/0x7f0 [ 638.651773][ C1] ? n_tty_read+0x1bf0/0x1bf0 [ 638.651777][ C1] __vfs_write+0x8a/0x110 [ 638.651780][ C1] ? put_tty_driver+0x20/0x20 [ 638.651783][ C1] vfs_write+0x268/0x5d0 [ 638.651787][ C1] ksys_write+0x14f/0x290 [ 638.651790][ C1] ? __ia32_sys_read+0xb0/0xb0 [ 638.651794][ C1] ? do_syscall_64+0x26/0x790 [ 638.651798][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.651801][ C1] ? do_syscall_64+0x26/0x790 [ 638.651804][ C1] __x64_sys_write+0x73/0xb0 [ 638.651807][ C1] do_syscall_64+0xfa/0x790 [ 638.651811][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.651814][ C1] RIP: 0033:0x45a909 [ 638.651824][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.651828][ C1] RSP: 002b:00007ff2a7d36c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 638.651836][ C1] RAX: ffffffffffffffda RBX: 00007ff2a7d36c90 RCX: 000000000045a909 [ 638.651840][ C1] RDX: 0000000000000001 RSI: 0000000020f03f44 RDI: 0000000000000004 [ 638.651845][ C1] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 638.651850][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff2a7d376d4 [ 638.651854][ C1] R13: 00000000004c7ca0 R14: 00000000004e4d08 R15: 0000000000000005 07:52:31 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:31 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 639.599938][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 639.607131][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:52:31 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:31 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 639.672012][ T4087] kobject: 'loop1' (000000002e1a75d6): kobject_uevent_env [ 639.705721][T25161] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25161] 07:52:31 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x1) [ 639.755011][ T4087] kobject: 'loop1' (000000002e1a75d6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 639.800083][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env [ 639.807259][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 639.862970][ T4087] kobject: 'loop2' (00000000ce597adb): kobject_uevent_env [ 639.885496][ T4087] kobject: 'loop2' (00000000ce597adb): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:52:31 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x1b3) [ 639.908950][T25152] bridge0: port 1(bridge_slave_0) entered disabled state 07:52:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000140)="31dda88645ce9efd96e0b66bed3244d971022a1bebf728bb573ce48c7325010adf788e3634a08dfe6d3dd4fab948cec44fcbb9ccb99c3f54988a397712a3b9c2fa1053d33c20b1ee395d032ecacf", 0x4e) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:31 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:31 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x3, 0x0, {0x14}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22100040}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x68, r2, 0x300, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xd42, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}}, 0x8080) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000300)=0x78) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1810000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x34, r6, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000430}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x7c, r6, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x5, 0x9, 0xc9]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x464}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x8]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_SECRET={0x18, 0x4, [0xffffffff, 0xdb3c, 0x5, 0xd3, 0x9]}, @SEG6_ATTR_ALGID={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4004080}, 0x40000) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) fcntl$getownex(r7, 0x10, &(0x7f0000000540)={0x0, 0x0}) process_vm_readv(r8, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sched_setscheduler(r8, 0x1, &(0x7f0000000500)=0x5) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:31 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0x20f03f45) [ 640.035474][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 640.050531][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:52:31 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 640.105249][T25487] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25487] [ 640.131581][ T4087] kobject: 'loop2' (00000000ce597adb): kobject_uevent_env [ 640.138758][ T4087] kobject: 'loop2' (00000000ce597adb): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:52:31 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 640.158687][T19258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 640.168934][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 640.174722][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 640.184878][T19258] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.192023][T19258] bridge0: port 1(bridge_slave_0) entered forwarding state 07:52:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xffffffffffffff33}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:31 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 640.226244][ T4087] kobject: 'loop5' (000000008849a4c1): kobject_uevent_env [ 640.259127][ T4087] kobject: 'loop5' (000000008849a4c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 640.260299][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env 07:52:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:32 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getuid() lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4, r3}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 640.306639][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 640.361618][ T4087] kobject: 'loop1' (000000002e1a75d6): kobject_uevent_env [ 640.385711][ T4087] kobject: 'loop1' (000000002e1a75d6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 640.407604][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env [ 640.415368][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 640.426778][T25612] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25612] [ 640.438003][ T4087] kobject: 'loop1' (000000002e1a75d6): kobject_uevent_env [ 640.441144][T25495] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.447290][ T4087] kobject: 'loop1' (000000002e1a75d6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 640.490051][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 640.497248][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 640.509976][T25606] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.511554][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env [ 640.517099][T25606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.525202][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 640.544161][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 640.552924][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:52:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'hsr0\x00', 0x2400}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendfile(r2, r1, 0x0, 0x7fffffff) write$rfkill(r1, &(0x7f0000000140)={0x7, 0x1, 0x3, 0x0, 0x1}, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000180)={0x1f, 0x5, 0x7ff, 0x13}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r11 = socket$netlink(0x10, 0x3, 0x0) sendfile(r11, r10, 0x0, 0x7fffffff) ioctl$SNDCTL_DSP_GETFMTS(r10, 0x8004500b, &(0x7f00000000c0)=0x8) bind$packet(r5, &(0x7f0000000040)={0x11, 0x19, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = accept4$inet(r1, &(0x7f0000000380)={0x2, 0x0, @broadcast}, &(0x7f00000003c0)=0x10, 0x80800) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000400)=@gcm_256={{0x304}, "2d7e30172601e76d", "1162820fccf935bd74b2c2a8cf398b774cd4e7ea33354ff1978fd880d7049191", "b5b8a2cd", "46902435052a8cc7"}, 0x38) r3 = socket$unix(0x1, 0x1, 0x0) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x40, 0x0) getsockopt$netlink(r4, 0x10e, 0xa, &(0x7f0000000200)=""/1, &(0x7f0000000240)=0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r6 = socket$netlink(0x10, 0x3, 0x0) sendfile(r6, r5, 0x0, 0x7fffffff) r7 = accept(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000300)=0x80) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r7, 0x800443d3, &(0x7f0000000340)={{0x3f, 0x0, 0x0, 0x7f, 0x0, 0x4}, 0x9, 0x4, 0xffffffe0}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r10 = socket$netlink(0x10, 0x3, 0x0) sendfile(r10, r9, 0x0, 0x7fffffff) r11 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r12 = socket$netlink(0x10, 0x3, 0x0) sendfile(r12, r11, 0x0, 0x7fffffff) r13 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r14 = socket$netlink(0x10, 0x3, 0x0) sendfile(r14, r13, 0x0, 0x7fffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r11, 0xc00c642e, &(0x7f0000000440)={0x0, 0x80000, r13}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r9, 0xc00c642e, &(0x7f00000004c0)={r15, 0x80000, r16}) r17 = socket$netlink(0x10, 0x3, 0x0) sendfile(r17, r8, 0x0, 0x7fffffff) linkat(r5, &(0x7f0000000000)='./file0\x00', r8, &(0x7f0000000140)='./file0\x00', 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:32 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:32 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 640.665143][ T4087] kobject: 'loop5' (000000008849a4c1): kobject_uevent_env [ 640.698144][ T4087] kobject: 'loop5' (000000008849a4c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 640.713590][T25622] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25622] [ 640.762654][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env [ 640.780689][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 640.861185][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 640.875807][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:52:32 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)='\t', 0xffffff1f) 07:52:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:32 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r0 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r0}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:32 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x7fffffff) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@getspdinfo={0x204, 0x25, 0x5c88ffa2eaba0686, 0x70bd26, 0x25dfdbfd, 0x2, [@address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@remote, 0xa, 0x6, 0x1}}, @ipv4_hthresh={0x8, 0x3, {0x3, 0x2}}, @algo_aead={0x110, 0x12, {{'rfc7539esp(ctr-cast5-avx,cbcmac-aes-neon)\x00'}, 0x608, 0x40, "222c0645f760a703e510d75e83418222adb63d648bbe4ab603c8f6d52c97906762e9b514d713dd7f9013f0fde1413a187bd3ba63b5c1f6a783371b71cca7bcbde0b5e1a35b14a23e3b38f3dfe4bf7c269a0f763d9135634251e5c8d7a63cc9b694737993cf842fcba0daa253fbfc402f69d3573227e0118bd4875c1e838efc62c6a79f5e7f6b40acd0fcf8b69295fbe05f8381e16b42e03b3144519a9bab61e86500cdc352b716181dd71befab8fbab2fd75f113ac8f44fc8111b6fab29a8c2f8f"}}, @encap={0x1c, 0x4, {0x1, 0x4e24, 0x4e22, @in=@loopback}}, @tmpl={0x84, 0x5, [{{@in6=@remote, 0x4d2}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3500, 0x2, 0x3, 0x1, 0x40, 0xcb16, 0x7}, {{@in=@multicast1, 0x4d4, 0xff}, 0x2, @in=@broadcast, 0x3505, 0xb97041f366ab5dfd, 0x2, 0x3, 0x80, 0xfffffa7b, 0x8}]}, @replay_thresh={0x8, 0xb, 0x7fffffff}, @proto={0x8, 0x19, 0x3c}]}, 0x204}, 0x1, 0x0, 0x0, 0x4c}, 0x10) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setregs(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000002, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = socket$netlink(0x10, 0x3, 0x0) sendfile(r4, r3, 0x0, 0x7fffffff) getsockname$unix(r3, &(0x7f0000000440), &(0x7f00000004c0)=0x6e) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r2, 0x1b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 07:52:32 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r0 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r0}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) [ 640.975291][ T4087] kobject: 'loop2' (00000000ce597adb): kobject_uevent_env [ 640.987980][T25941] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25941] [ 640.991056][ T4087] kobject: 'loop2' (00000000ce597adb): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:52:32 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 641.048604][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env [ 641.116820][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 641.155039][T25967] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[25967] [ 641.176749][ T4087] kobject: 'loop1' (000000002e1a75d6): kobject_uevent_env 07:52:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r7 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r7, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r7, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) setsockopt(r7, 0xdc0, 0x18, &(0x7f0000000140)="0319fd892ea1389eb0341da2426292f3364ff2208f10c99593eaca3d60deac8576cc16b43415925317b1b1558c3039dc8a4ec20662d46d95ca319bb9909cbd0f64c4908ef895dd01d440b2c63300bc4ffd9d4b10cd114a090f8d22b637373191636f33d1f39b5546165ae5060d2deff0b8a0b1", 0x73) alarm(0x8000000000000000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:32 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:32 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r0 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r0}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r1, &(0x7f0000000040)={0x11, 0x19, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 641.219246][ T4087] kobject: 'loop1' (000000002e1a75d6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 641.231211][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 641.238460][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 641.304579][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 641.316030][T26062] ptrace attach of "/root/syz-executor.4"[9014] was attempted by "/root/syz-executor.4"[26062] [ 641.360119][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 641.392777][ T4087] kobject: 'loop5' (000000008849a4c1): kobject_uevent_env [ 641.403199][ T4087] kobject: 'loop5' (000000008849a4c1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 641.418311][ T4087] kobject: 'loop3' (00000000170ecb1e): kobject_uevent_env [ 641.430042][ T4087] kobject: 'loop3' (00000000170ecb1e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 641.458194][ T4087] kobject: 'loop1' (000000002e1a75d6): kobject_uevent_env [ 641.468099][ T4087] kobject: 'loop1' (000000002e1a75d6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 641.499436][T26068] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.556790][ T4087] kobject: 'loop4' (000000009c5ec113): kobject_uevent_env [ 641.569296][ T4087] kobject: 'loop4' (000000009c5ec113): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 641.582911][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 641.593094][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.600204][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 641.607592][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 641.613365][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 641.654598][T26068] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.701809][ T4087] kobject: 'loop5' (000000008849a4c1): kobject_uevent_env [ 641.709397][ T4087] kobject: 'loop5' (000000008849a4c1): fill_kobj_path: path = '/devices/virtual/block/loop5' 07:52:33 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x1a8) r1 = getuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid=r1}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x43}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffe02}, {0x0, 0xffffffffffffffd7}, {&(0x7f0000000180)=""/63, 0x1d}], 0x1b5, 0x0, 0x36b, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:52:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) bind$packet(r2, &(0x7f0000000040)={0x11, 0x19, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:33 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xffffffffffffff95, &(0x7f0000000340)=0xa000000000000005) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@multicast1}, @generic='\fq', @typed={0x8, 0x7, @u32}, @typed={0x8, 0x11, @uid}, @generic="013374e70463444ed4415c839d0125dddc99117d94fa9b929ea39ad06f39149aa11d56248d8da021a3df21a92f065dbceeb56edb0f5f7a454c45d5e0a9c7c4d1961dec64fb03e054158b7a36dea29d21bf9374aa6965e95fffe9783473ddfad09b77a2e10e3c4d748ab83020702c4516cf5c5066de42e2e21b5515cf0afb45bac39f51b75422acba55a3d4352ff59cd97ab47bcac5e60e5cfb9f7f6e0be7208f3e51a52fbd16b07ddbced922bf7d64238073310fbc8342636fb3e09a49b8f6693295ba873f609def", @generic="2169f7ebf4d285f34744178f317117e7acf68a0bb62cd272c479e3b7259fcfce680463ffdf187a894f11d99e7a4c4c495b674fdc8b4a10ca7cf910005143595c8af78461a8732b91c857f4cb4b3edc23c4804786dbcecde8b638f7cf13e4b8c07e2188bf6b983ad6ea75b66275299a086222853dffec81b9d0e247b9ac8cb6e7a75024ba61ee9893a772f0ee1e8e70484ce68701996a84283e5ea4ebdb4897f35a4ef848c1b59bf6881925"]}, @nested={0x98, 0x27, [@generic="3f3a7f61bc4eb88b990de273eb8246ee84d394db293546c027a5e11915a93ff438f4", @generic="07d453ddf7521df712f87cf17690db2dfaed4312819828a5625a18f7f9e540080d8f2e61", @generic="768919e25f6ec27c92e0ed517fa73a844d8f0f072d20fb3d96e206381d637eba5305b82fce2d3a2e2a233ddba7339ee9a8105de236b3f8b7d7c984dfa0d46a48c278fa8bd61efccc3eb50e"]}, @typed={0x8, 0x92, @uid}, @nested={0x20, 0x8c, [@typed={0x14, 0x6b, @ipv6=@empty}, @typed={0x8, 0x2b, @pid}]}, @typed={0x4, 0x68}, @nested={0x190, 0x58, [@generic="f1c52c3edbd459a1904d4ac081919c926f2d067e2e2db415d2173354a9767e5848a01b1bf06acef1528c2ce71f15398eb0323c2d76532569db7825ee23012080996e01c138c4dfea4dc0987873e17e4296ae514c4745b5408cf160fc6b7f63f93ff85bb6bea0f1a2e8e19f0f749e7422f38d243b7ba2d837d994cc0a29c56e07c858e393fff948756b4fdc1a57eb466370cd83a417", @generic="268a22449c792efb232577ac5d00f1eba992f3751b5d74af42ce4971c28047ade98659ac634a3cd54b2e63c9a2f6082c479e317b33f247a958cd57aee4154165afc2620d4caad88bfe9bc6abe6e96666553df3924644e3525d3b73c81a0250767fbcb5f98ea6a4f347bbb4dd8fa82eb2ff576e41794172e651", @typed={0xc, 0x48, @u64=0x9}, @generic="48c24a97806ca9dda3c904ca9c7b10590304c498c9b601cdda0910ff2e51c7bc974eb038d43236e9ee75097cdcd60061b35ec44cc35bd00b790ae80ff05f92bc2c7346918ee5a1b660e7e3a83124ba657427d618bd2d849c4aea7aeef4ec224bc6b54c1fbbf6231f6a654749490786e86b02"]}, @typed={0x4, 0x91}]}, 0x55c}, 0x1, 0x0, 0x0, 0x44800}, 0x4) 07:52:33 executing program 2: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$FBIOGET_VSCREENINFO(0xffffffffffffffff, 0x4600, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000000)) write(r0, &(0x7f0000f03f44)='\t', 0x1) 07:52:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e3d, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @loopback, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f00000000c0)='bridge_slave_0\x00', 0x40, 0xa, &(0x7f0000000140)={0x2, 0x4, 0x4, 0x1000, 0x1000, 0x80000000, 0x5d9, 0x800}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r7, &(0x7f00000001c0)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0xfffffffffffffeb2) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000000)) r8 = dup2(r6, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bind$packet(r4, &(0x7f0000000040)={0x11, 0x19, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 07:52:33 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(r0, &(0x7f00000000c0)='memg?\x00\x00\x00\x00\x00\x00\x00R\xab\xa2\xda`\xcb\xe1\xb5\x17\xe5\x87p|\x14l', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000480)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x50b00, 0x0) openat$cgroup_type(r2, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {}, [{}, {0x2, 0x4}, {0x2, 0x5}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x4}, [], {0x10, 0x7}}, 0x4c, 0x3) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x41041020}, 0xc, &(0x7f00000005c0)={&(0x7f0000000700)={0x55c, 0x13, 0x100, 0x70bd29, 0x25dfdbff, {0x5}, [@typed={0x20, 0x4a, @str='selinux-security\xc2cpuset/\x00'}, @typed={0x8, 0x58, @uid}, @typed={0x8, 0x4e, @pid}, @nested={0x2c0, 0x26, [@generic="88070d44551aea53b3cbe988c8fd7aed34ccf50557d12d95e56e1ba5f06ea0360b792e97a14b3e64c43711ab295d5370ef6706f008e167fdaa84b5f0f14ea4bb62d578511a1de451188656fd99b9935128d5d408f62840785637a23092036107385a32476aa2d1707bf29d1d02", @generic="f5ea3d3a5abdd1b0a85ffc49c5", @generic="3b86f1e89809e11a846ac7e5ff7fe637161463d307307ea82ca14c774437d2d85b3c7fd9326375c903e62d31bfa79ccd7e722f6fe0a3ebf275eb7c3b2f8b786d2ed71ac80b35d46fec6afd67d4a6d6c2b87a2baf1e1e69f0c11bc481e2e6e7e83c62fea49edc4dc6332a550c568428d82e61dfa3afdaa55e3d429958bd8a13e5dce4ad6470ef50716df3ae9dd9e5bc09b4567705846e0c3f2f3beac8f8e359e7a21e185d7c3896446d1b6c372ee9c05924eccced", @typed={0x8, 0x4a, @ipv4=@mult