[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.682442][ T26] audit: type=1800 audit(1568382567.269:25): pid=8454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 53.726423][ T26] audit: type=1800 audit(1568382567.269:26): pid=8454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 53.764336][ T26] audit: type=1800 audit(1568382567.279:27): pid=8454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.177' (ECDSA) to the list of known hosts. 2019/09/13 13:49:35 fuzzer started 2019/09/13 13:49:37 dialing manager at 10.128.0.26:34453 2019/09/13 13:49:37 syscalls: 2487 2019/09/13 13:49:37 code coverage: enabled 2019/09/13 13:49:37 comparison tracing: enabled 2019/09/13 13:49:37 extra coverage: extra coverage is not supported by the kernel 2019/09/13 13:49:37 setuid sandbox: enabled 2019/09/13 13:49:37 namespace sandbox: enabled 2019/09/13 13:49:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/13 13:49:37 fault injection: enabled 2019/09/13 13:49:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/13 13:49:37 net packet injection: enabled 2019/09/13 13:49:37 net device setup: enabled 13:51:52 executing program 0: 13:51:52 executing program 1: syzkaller login: [ 198.899314][ T8621] IPVS: ftp: loaded support on port[0] = 21 [ 199.082055][ T8621] chnl_net:caif_netlink_parms(): no params data found 13:51:52 executing program 2: [ 199.144036][ T8621] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.153922][ T8621] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.162661][ T8621] device bridge_slave_0 entered promiscuous mode [ 199.173417][ T8621] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.180939][ T8621] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.191703][ T8621] device bridge_slave_1 entered promiscuous mode [ 199.227796][ T8624] IPVS: ftp: loaded support on port[0] = 21 [ 199.260454][ T8621] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.281045][ T8621] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.328264][ T8621] team0: Port device team_slave_0 added [ 199.337127][ T8621] team0: Port device team_slave_1 added [ 199.383647][ T8626] IPVS: ftp: loaded support on port[0] = 21 13:51:53 executing program 3: [ 199.432349][ T8621] device hsr_slave_0 entered promiscuous mode [ 199.480830][ T8621] device hsr_slave_1 entered promiscuous mode [ 199.587909][ T8621] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.595259][ T8621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.603119][ T8621] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.610225][ T8621] bridge0: port 1(bridge_slave_0) entered forwarding state 13:51:53 executing program 4: [ 199.699584][ T8628] IPVS: ftp: loaded support on port[0] = 21 [ 199.778777][ T8624] chnl_net:caif_netlink_parms(): no params data found [ 199.913422][ T8621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.928644][ T8632] IPVS: ftp: loaded support on port[0] = 21 [ 199.940876][ T8624] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.947950][ T8624] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.960449][ T8624] device bridge_slave_0 entered promiscuous mode [ 199.992894][ T8624] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.001876][ T8624] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.010040][ T8624] device bridge_slave_1 entered promiscuous mode [ 200.021843][ T8621] 8021q: adding VLAN 0 to HW filter on device team0 13:51:53 executing program 5: [ 200.063400][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.074700][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.095295][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.107183][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 200.164920][ T8624] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.178751][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.188780][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.197503][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.204600][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.221530][ T8628] chnl_net:caif_netlink_parms(): no params data found [ 200.234332][ T8624] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.255792][ T8624] team0: Port device team_slave_0 added [ 200.268147][ T8626] chnl_net:caif_netlink_parms(): no params data found [ 200.288992][ T8637] IPVS: ftp: loaded support on port[0] = 21 [ 200.298302][ T8624] team0: Port device team_slave_1 added [ 200.333092][ T8628] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.341546][ T8628] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.349081][ T8628] device bridge_slave_0 entered promiscuous mode [ 200.358189][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.366810][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.375278][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.382338][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.411599][ T8628] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.418663][ T8628] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.427026][ T8628] device bridge_slave_1 entered promiscuous mode [ 200.492382][ T8624] device hsr_slave_0 entered promiscuous mode [ 200.539710][ T8624] device hsr_slave_1 entered promiscuous mode [ 200.589564][ T8624] debugfs: Directory 'hsr0' with parent '/' already present! [ 200.598631][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.617091][ T8628] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.638364][ T8626] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.645568][ T8626] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.653161][ T8626] device bridge_slave_0 entered promiscuous mode [ 200.667031][ T8628] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.687989][ T8626] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.695257][ T8626] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.703365][ T8626] device bridge_slave_1 entered promiscuous mode [ 200.719552][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.764284][ T8628] team0: Port device team_slave_0 added [ 200.771991][ T8628] team0: Port device team_slave_1 added [ 200.779633][ T8626] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.796169][ T8626] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.807287][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.815884][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.824275][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.832979][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.841476][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.849801][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.859628][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.867885][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.876239][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.901090][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.922840][ T8632] chnl_net:caif_netlink_parms(): no params data found [ 200.942986][ T8626] team0: Port device team_slave_0 added [ 201.011842][ T8628] device hsr_slave_0 entered promiscuous mode [ 201.079793][ T8628] device hsr_slave_1 entered promiscuous mode [ 201.119743][ T8628] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.129681][ T8626] team0: Port device team_slave_1 added [ 201.191372][ T8626] device hsr_slave_0 entered promiscuous mode [ 201.229916][ T8626] device hsr_slave_1 entered promiscuous mode [ 201.299636][ T8626] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.380494][ T8621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.416658][ T8637] chnl_net:caif_netlink_parms(): no params data found [ 201.437215][ T8632] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.445740][ T8632] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.453681][ T8632] device bridge_slave_0 entered promiscuous mode [ 201.461730][ T8632] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.468770][ T8632] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.476550][ T8632] device bridge_slave_1 entered promiscuous mode [ 201.516416][ T8632] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.552500][ T8632] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.605496][ T8632] team0: Port device team_slave_0 added [ 201.616207][ T8624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.626405][ T8637] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.634107][ T8637] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.642240][ T8637] device bridge_slave_0 entered promiscuous mode [ 201.658447][ T8626] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.668524][ T8632] team0: Port device team_slave_1 added 13:51:55 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) write$P9_RSTAT(r0, &(0x7f0000000140)={0x4b, 0x7d, 0x1, {0x0, 0x44, 0x8, 0x9, {0xa0, 0x3, 0x5}, 0x20000, 0x0, 0x3, 0x6, 0x0, '', 0x0, '', 0x7, 'TIPCv2\x00', 0xa, '/dev/dsp#\x00'}}, 0x4b) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r1 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r2 = dup3(r1, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x1, 0x0, 0xffffffff7fffffff, 0xa00000000}, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000001380)='TIPCv2\x00') syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x24c400) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) [ 201.701235][ T8637] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.708304][ T8637] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.716626][ T8637] device bridge_slave_1 entered promiscuous mode [ 201.734433][ T8624] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.803345][ T8632] device hsr_slave_0 entered promiscuous mode [ 201.840163][ T8632] device hsr_slave_1 entered promiscuous mode [ 201.879981][ T8632] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.894826][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.903049][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.911587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.919204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.927986][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.937234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.946107][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.953199][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.959750][ C1] hrtimer: interrupt took 43147 ns [ 201.962603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.980067][ T8626] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.995316][ T8637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.027666][ T8630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.036428][ T8630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.045436][ T8630] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.052646][ T8630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.060426][ T8630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.069181][ T8630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.093044][ T8628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.103258][ T8637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.127400][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.136779][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.146186][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.153285][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.163324][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.173573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.182000][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.189022][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.196704][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.206097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.214809][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.223441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.232155][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.241082][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.249447][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.257626][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.266050][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.274678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.283435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.292132][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.300983][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.309229][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.317068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.343922][ T8637] team0: Port device team_slave_0 added [ 202.352251][ T8637] team0: Port device team_slave_1 added [ 202.358784][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.368609][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.378161][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.387328][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.400256][ T8626] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.423085][ T8624] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.435644][ T8624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.472847][ T8628] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.480318][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.488641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.504271][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.512679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.584086][ T8637] device hsr_slave_0 entered promiscuous mode 13:51:56 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) write$P9_RSTAT(r0, &(0x7f0000000140)={0x4b, 0x7d, 0x1, {0x0, 0x44, 0x8, 0x9, {0xa0, 0x3, 0x5}, 0x20000, 0x0, 0x3, 0x6, 0x0, '', 0x0, '', 0x7, 'TIPCv2\x00', 0xa, '/dev/dsp#\x00'}}, 0x4b) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r1 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r2 = dup3(r1, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x1, 0x0, 0xffffffff7fffffff, 0xa00000000}, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000001380)='TIPCv2\x00') syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x24c400) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) [ 202.639931][ T8637] device hsr_slave_1 entered promiscuous mode [ 202.679528][ T8637] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.693968][ T8632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.716983][ T8630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.727646][ T8630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.742433][ T8630] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.749546][ T8630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.786558][ T8624] 8021q: adding VLAN 0 to HW filter on device batadv0 13:51:56 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r7 = accept$alg(r6, 0x0, 0x0) r8 = open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) fallocate(r8, 0x0, 0x0, 0x40007) sendfile(r7, r8, 0x0, 0x400) [ 202.851965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.876361][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.900686][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.909109][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.916219][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.932138][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.940918][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.948478][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.977359][ T8632] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.989865][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.998347][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.013294][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.024244][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.033259][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.047423][ T8628] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 203.058093][ T8628] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.077762][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.086983][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.095989][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.104837][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.113462][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.121779][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.130507][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.138794][ T3760] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.145885][ T3760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.154175][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.164375][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 13:51:56 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r7 = accept$alg(r6, 0x0, 0x0) r8 = open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) fallocate(r8, 0x0, 0x0, 0x40007) sendfile(r7, r8, 0x0, 0x400) [ 203.224197][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.241152][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 13:51:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x600000487, 0x0, 0x8b]}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000000)={0x1, 0xf972}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000080)={0x2, 0x4}) [ 203.289332][ T8638] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.296495][ T8638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.324904][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.357678][ T8628] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.392921][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.400026][ C1] protocol 88fb is buggy, dev hsr_slave_0 13:51:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x1000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 203.406722][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 203.407937][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.429556][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 203.430468][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.435336][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 203.465441][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.496083][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 13:51:57 executing program 0: r0 = socket$inet(0x2, 0x3, 0x19) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x80}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r1, 0x7}, 0x8) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffff, 0x2000) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) sendmmsg$inet(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x89, 0x2}]}}}], 0x18}}], 0x2, 0x0) [ 203.511431][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.534247][ T8637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.540996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 203.541039][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 203.554568][ T8691] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.562070][ T8691] bridge0: port 1(bridge_slave_0) entered disabled state 13:51:57 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x6, 0x0, 0x11, 0x0, @empty=0xac1414bb, @multicast1}, @udp={0x4e20, 0x4e21, 0x8}}}}}, 0x0) 13:51:57 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r7 = accept$alg(r6, 0x0, 0x0) r8 = open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) fallocate(r8, 0x0, 0x0, 0x40007) sendfile(r7, r8, 0x0, 0x400) [ 203.767839][ T8632] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 203.813165][ T8632] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.839937][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.848610][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.875111][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.900058][ T8638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.916401][ T8637] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.989488][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 203.995298][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 204.006834][ T8700] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.013977][ T8700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.021404][ T8700] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.028481][ T8700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.049813][ T8700] device bridge0 entered promiscuous mode [ 204.102987][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.130651][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.138510][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.159962][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.168642][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.177275][ T8639] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.184377][ T8639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.193821][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.204993][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.213550][ T8639] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.220639][ T8639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.230604][ T8639] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.238430][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 13:51:57 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x7, 0x32}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r1, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) [ 204.261485][ T8691] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.268929][ T8691] device bridge0 left promiscuous mode [ 204.387721][ T8632] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.438469][ T8637] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 204.469424][ T8637] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 204.523930][ T8637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.548219][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.565660][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.593729][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.606025][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.614952][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.623911][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.632717][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.641329][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.649846][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.658021][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.667559][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.675317][ T8639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:51:58 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r7 = accept$alg(r6, 0x0, 0x0) r8 = open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) fallocate(r8, 0x0, 0x0, 0x40007) sendfile(r7, r8, 0x0, 0x400) 13:51:58 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r2, 0xc00000000000000) shmctl$SHM_UNLOCK(r2, 0xc) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000000)=0x7, 0x4) sendto$inet(r3, &(0x7f00000002c0)="58124dd50223523a382dcff0f344934695662b634f180c9693fd2bba9c333b90f0f6a42e9a02f7dd5176de64c6bedd1f7a5688d6bad3dcbfc16623f5e42bc3e3204d58ee1d19cb76d6e9c57bdfaeb7e4ded9237ba4783cb8304c265064ffeeb2754866354dc343f5f4e9ca41d8c6e804dc2281b74aa4ea000000003f594d2b2a601c73addd63160530ae099fc57c67a6f25332fd5c350d0396f81c92d0a3033acef259df019a4cbf2f7c227b2fa258356ddafde48e5edff8f12a3041ff7d36c446104f03c053002d3bcb72753b586c328a74c3bda2b243c11fb7fd6ebec7b6cac9e9c49c0af76be3ddd249c038111386e7de6a6683669587e6f99173f231cd510e2f00"/274, 0x112, 0x20800, 0x0, 0x0) 13:51:58 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000180)=0x3b34d9f0, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup(r1) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x7, 0x4) connect$ax25(r0, &(0x7f00000000c0)={{0x3, @netrom, 0x7}, [@null={0x40, 0x40, 0x40, 0x40, 0x40, 0x40, 0x25dfdbfc}, @bcast, @remote, @rose, @null, @default, @default]}, 0x48) [ 204.879500][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 204.885309][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:51:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x1000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 13:51:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x1000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 13:51:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x28, 0x11, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x2}]}, 0x28}}, 0x0) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x6) r1 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r6, &(0x7f00000017c0), 0x199, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f0000000280)={0xc, 0x8, 0xfa00, {&(0x7f0000000340)}}, 0x10) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@newneigh={0x1c, 0x1c, 0x800, 0x70bd2b, 0x25dfdbfd, {0x1, 0x0, 0x0, r7, 0x20, 0x20, 0xc}}, 0x1c}, 0x1, 0x0, 0x0, 0xb3f2b442bfbfacd3}, 0x40) [ 204.976280][ T8737] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de [ 204.986175][ T8741] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.993303][ T8741] bridge0: port 2(bridge_slave_1) entered forwarding state 13:51:58 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) r7 = open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) fallocate(r7, 0x0, 0x0, 0x40007) [ 205.023878][ T8748] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de [ 205.033713][ T8741] device bridge0 entered promiscuous mode [ 205.043500][ T8742] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.050916][ T8742] bridge0: port 1(bridge_slave_0) entered disabled state 13:51:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x1000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 13:51:58 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000180)=0x3b34d9f0, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup(r1) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x7, 0x4) connect$ax25(r0, &(0x7f00000000c0)={{0x3, @netrom, 0x7}, [@null={0x40, 0x40, 0x40, 0x40, 0x40, 0x40, 0x25dfdbfc}, @bcast, @remote, @rose, @null, @default, @default]}, 0x48) 13:51:58 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0xc0205649, &(0x7f00000002c0)={0xf010000, 0x0, 0x0, [0xff000000]}) r1 = socket(0x11, 0x100000802, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000100)={0x14, 0x13, 0x2, {0x8, 0x4, 0x5}}, 0x14) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r1, 0x107, 0x620277d6bd108a3e, 0x0, &(0x7f00000000c0)=0xffffffffffffff61) getsockopt$inet6_tcp_int(r1, 0x6, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f0000000080)) [ 205.443849][ T8777] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de 13:51:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x5c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x28, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OKEY={0x8, 0x5, 0xffffffff}, @IFLA_GRE_ERSPAN_HWID={0x8, 0x18, 0x200}, @IFLA_GRE_TTL={0x8, 0x8, 0x121c}, @IFLA_GRE_ENCAP_TYPE={0x8, 0xe, 0x52e8b60c91b8b169}]]}}}]}, 0x5c}}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 205.700607][ T8757] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.707714][ T8757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.715122][ T8757] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.722232][ T8757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.759660][ T8757] device bridge0 entered promiscuous mode 13:51:59 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x2, r1}, {}, {}], {0x10, 0x6}}, 0x3c, 0x0) syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@case_sensitive_no='case_sensitive=no'}, {@errors_continue='errors=continue'}, {@show_sys_files_yes='show_sys_files=yes'}, {@dmask={'dmask', 0x3d, 0x3f}}, {@gid={'gid'}}, {@errors_recover='errors=recover'}, {@umask={'umask'}}, {@fmask={'fmask'}}, {@show_sys_files_no='show_sys_files=no'}, {@umask={'umask'}}]}) 13:51:59 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) [ 205.887595][ T8766] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.910464][ T8766] device bridge0 left promiscuous mode [ 206.020901][ T8786] __ntfs_error: 3 callbacks suppressed [ 206.020910][ T8786] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 13:51:59 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) r1 = getpid() getpriority(0xfffffffffffffffe, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x43, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2e74}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000280)={0x10}) socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) syz_open_dev$ndb(0x0, 0x0, 0xc040) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x80, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) r4 = syz_open_dev$cec(0x0, 0x0, 0x2) r5 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$TIOCLINUX6(r5, 0x541c, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000080)={r7}) ioctl$TIOCLINUX6(r4, 0x541c, 0x0) socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) ioctl$VT_RELDISP(r9, 0x5605) [ 206.094031][ T8774] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.101164][ T8774] bridge0: port 2(bridge_slave_1) entered forwarding state 13:51:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r3, &(0x7f00000017c0), 0x199, 0x0) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) [ 206.153098][ T8774] device bridge0 entered promiscuous mode [ 206.188843][ T8630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.209169][ T8630] bridge0: port 1(bridge_slave_0) entered disabled state 13:51:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x1000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 206.249730][ T8781] netlink: 'syz-executor.4': attribute type 24 has an invalid length. [ 206.269314][ T8781] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 206.277559][ T8781] netlink: 'syz-executor.4': attribute type 14 has an invalid length. 13:51:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x66, &(0x7f0000000540)=ANY=[@ANYRES32=r1, @ANYBLOB="cafe009dec55f35e222ffef7686ed500000000005e9d11df61aa3aea43151f9eca047ed1b4b6a6ebec6d39c44b84846a0300000035d6ab52559a2274ae7114588900003f9490536e11ede16ebb0e793053553c00780000000000000000000000001900f9e674b112a207001d4e5a843b0030a50b20c0d8dc56c2b9b4040052024d28cc26f02b7bb4dcc1f58e15d86ef331e679309cc81ea02b1abe5ab5dba14cb91acdd283f2fca2fccd16eaa5417a00390300c9049bcc6a0c65d5c6c028b11ddd10132ee49d8b59ac2c71167cccc1d5eb00"/233], &(0x7f0000000240)=0xfe0b) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x9, &(0x7f00000003c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, {0x0, @in={{0x2, 0x0, @remote}}}}, &(0x7f0000000140)=0xb0) [ 206.393339][ T8781] netlink: 'syz-executor.4': attribute type 24 has an invalid length. [ 206.418740][ T8781] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 206.451284][ T8781] netlink: 'syz-executor.4': attribute type 14 has an invalid length. [ 206.472095][ T8808] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.493215][ T8808] device bridge0 left promiscuous mode 13:52:00 executing program 5: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x2, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 13:52:00 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) 13:52:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = accept(r0, &(0x7f0000000040)=@alg, &(0x7f0000000100)=0x80) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x83}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40814}, 0x8000) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="48010000243e444ccaefd818000ba50f00000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008000100726564001c0102000401020018e23137ddb2aefd32758a7aa2692c5800d4ac5edcba174b297a11e5f77f141acc71fe75bdc70d2e970795bf52ccc207f317fa4ca1113ff70087999d345ab92753c8084db70f62ee7ca5205667cf7446b339c7ab2285464c5a381830b4309a3b2753681a69c5e3d91dd6c23b60ce1d0aa92c5b77d658c2ce94c89d666901e22d642a33c1d78ecbe2806ad2021ed1cb849015fc69664585535188060cbe48c2ab7faac757d4293ca20dee8e5b23fc3c4363c3247341711c9e97dcada0e464aa39afe91659af05c6ce384a8411678beca5e728cf6e9355c35213f007d98cf7a597c5dc7f8ffc52464801c1dffe22d9208db5ed08cf5593c00b74791cc9d6412eee1400010000000000000000000000000000000005"], 0x148}}, 0x0) 13:52:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r3, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f00000001c0)={'broute\x00', 0x0, 0x3, 0xaa, [], 0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/170}, &(0x7f0000000100)=0x78) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r4, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x40000000000002f, 0x0) [ 206.890801][ T8805] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.898058][ T8805] bridge0: port 2(bridge_slave_1) entered forwarding state 13:52:00 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) r1 = getpid() getpriority(0xfffffffffffffffe, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x43, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2e74}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000280)={0x10}) socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) syz_open_dev$ndb(0x0, 0x0, 0xc040) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x80, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) r4 = syz_open_dev$cec(0x0, 0x0, 0x2) r5 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$TIOCLINUX6(r5, 0x541c, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000080)={r7}) ioctl$TIOCLINUX6(r4, 0x541c, 0x0) socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) ioctl$VT_RELDISP(r9, 0x5605) [ 206.978801][ T8805] device bridge0 entered promiscuous mode 13:52:00 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) 13:52:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000040)}, 0xd36429b702d9db90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = semget(0x1, 0x4, 0x600) semop(r3, &(0x7f0000000540), 0x0) semctl$GETZCNT(r3, 0x0, 0xf, &(0x7f0000000340)=""/152) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="77000000881bf7f3fb20128ca19341c6d6f4741b56962dc55de4e99ba827644b36462601fde62f9002050000005d93d7476aaffff81db5d45884190000010062cbde621be98b793ee4ecc2b2d6eba6d26f8a07bba0c10431f772796802eef0535083898c77ccb93b553bb45e6ed1c3a7be47080600000000000000"], &(0x7f0000000140)=0x7f) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000180)={r5, 0x200}, 0x8) recvmsg(r0, &(0x7f0000007a40)={0x0, 0x0, 0x0}, 0x0) 13:52:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 13:52:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffff, 0x10000) recvfrom$x25(r2, &(0x7f0000000080)=""/102, 0x66, 0x40000000, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) accept(r1, 0x0, 0x0) userfaultfd(0x800) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0f00000000000002004e21ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000400000002004e23ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbc37edc066cf50c18d8057ba6e88410a03905cb3144460e9dd72c586272cc6c5a120a2072948167c466d19531b937f765b972515874778b4b6617c0651299812bbdd3d55ff23956557e7012ccb219a5b88e75b4f9a088a27047501f91d50a0b2ccab531c38d725b266d3d90ab3c7fda8e1d8c506ae7d1"], 0x290) 13:52:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/334], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:52:01 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) r1 = getpid() getpriority(0xfffffffffffffffe, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x43, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2e74}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000280)={0x10}) socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) syz_open_dev$ndb(0x0, 0x0, 0xc040) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x80, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000009c0)) r4 = syz_open_dev$cec(0x0, 0x0, 0x2) r5 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$TIOCLINUX6(r5, 0x541c, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000080)={r7}) ioctl$TIOCLINUX6(r4, 0x541c, 0x0) socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r8, &(0x7f00000017c0), 0x199, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='timers\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) ioctl$VT_RELDISP(r9, 0x5605) 13:52:01 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x40007) [ 207.976735][ T8859] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.991115][ T8859] device bridge0 left promiscuous mode [ 208.166737][ T8865] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.173875][ T8865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.199625][ T8865] device bridge0 entered promiscuous mode 13:52:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 208.439547][ C0] net_ratelimit: 16 callbacks suppressed [ 208.439556][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 208.451280][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:52:02 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x40007) [ 208.912518][ T8895] bridge0: port 2(bridge_slave_1) entered disabled state 13:52:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 13:52:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffff, 0x10000) recvfrom$x25(r2, &(0x7f0000000080)=""/102, 0x66, 0x40000000, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) accept(r1, 0x0, 0x0) userfaultfd(0x800) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0f00000000000002004e21ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000400000002004e23ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbc37edc066cf50c18d8057ba6e88410a03905cb3144460e9dd72c586272cc6c5a120a2072948167c466d19531b937f765b972515874778b4b6617c0651299812bbdd3d55ff23956557e7012ccb219a5b88e75b4f9a088a27047501f91d50a0b2ccab531c38d725b266d3d90ab3c7fda8e1d8c506ae7d1"], 0x290) [ 208.953383][ T8895] device bridge0 left promiscuous mode 13:52:02 executing program 0: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba82d39d236ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8421a484e65b37e8e638e4a94339e16d0b524e0ef4ea10fc5290093ea975cc22ca7c07ced93b665d9e45871f7687d63f44d4d868a2bf9e07a4bbe73465b0a0fe52f521c2b628ff39b6d2480903c78686a14d739f87ae2ff7d3ac951fc84cfa8bdcbcf26f0a11713398bd8b07477e97bf95f06bfe2be689eac6939df6e0b2d896b93b00a19ea6b1b2c5f"], 0xfc7c) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) lseek(r0, 0x0, 0x3) acct(0x0) [ 209.079487][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 209.085398][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:52:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0xd533fa67c9039f2a, 0x0) fcntl$dupfd(r0, 0x88eacf1f405d9565, r0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) [ 209.150763][ T8897] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.157859][ T8897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.228335][ T8897] device bridge0 entered promiscuous mode [ 209.240015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 209.245828][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:52:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 13:52:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffff, 0x10000) recvfrom$x25(r2, &(0x7f0000000080)=""/102, 0x66, 0x40000000, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) accept(r1, 0x0, 0x0) userfaultfd(0x800) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0f00000000000002004e21ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000400000002004e23ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbc37edc066cf50c18d8057ba6e88410a03905cb3144460e9dd72c586272cc6c5a120a2072948167c466d19531b937f765b972515874778b4b6617c0651299812bbdd3d55ff23956557e7012ccb219a5b88e75b4f9a088a27047501f91d50a0b2ccab531c38d725b266d3d90ab3c7fda8e1d8c506ae7d1"], 0x290) [ 209.294718][ T8908] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.302306][ T8908] bridge0: port 1(bridge_slave_0) entered disabled state 13:52:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0xd533fa67c9039f2a, 0x0) fcntl$dupfd(r0, 0x88eacf1f405d9565, r0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 13:52:03 executing program 3: r0 = socket(0x40000000015, 0x4, 0x0) r1 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r1, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000180)={r5, @in={{0x2, 0x4e24, @multicast1}}, 0x6}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000300)={r5, 0x9}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x2, 0x204, 0x1, 0x9, 0x1c, 0x7f, 0x6, r5}, &(0x7f0000000100)=0x20) getsockopt(r0, 0x40000000114, 0x1000000002718, 0x0, &(0x7f00000000c0)) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_int(r6, 0x1, 0x2d, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 209.573597][ T8914] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.580812][ T8914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.588198][ T8914] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.595459][ T8914] bridge0: port 1(bridge_slave_0) entered forwarding state 13:52:03 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x40007) [ 209.627914][ T8914] device bridge0 entered promiscuous mode [ 209.639469][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 209.645309][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:52:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffff, 0x10000) recvfrom$x25(r2, &(0x7f0000000080)=""/102, 0x66, 0x40000000, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) accept(r1, 0x0, 0x0) userfaultfd(0x800) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0f00000000000002004e21ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000400000002004e23ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbc37edc066cf50c18d8057ba6e88410a03905cb3144460e9dd72c586272cc6c5a120a2072948167c466d19531b937f765b972515874778b4b6617c0651299812bbdd3d55ff23956557e7012ccb219a5b88e75b4f9a088a27047501f91d50a0b2ccab531c38d725b266d3d90ab3c7fda8e1d8c506ae7d1"], 0x290) [ 209.707684][ T8932] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.719479][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 209.725274][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 209.738546][ T8932] device bridge0 left promiscuous mode 13:52:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 209.964641][ T8935] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.971752][ T8935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.989633][ T8935] device bridge0 entered promiscuous mode 13:52:03 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0xd9) getpeername$ax25(r0, &(0x7f0000000040)={{0x3, @null}, [@bcast, @null, @default, @default, @default, @null, @null, @null]}, &(0x7f0000000100)=0x48) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20104000000000000030000000c00000009", 0x15, 0x1400}], 0x0, 0x0) accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x1000) 13:52:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffff, 0x10000) recvfrom$x25(r2, &(0x7f0000000080)=""/102, 0x66, 0x40000000, &(0x7f0000000100)={0x9, @remote={[], 0x2}}, 0x12) accept(r1, 0x0, 0x0) userfaultfd(0x800) 13:52:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x803, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'bridge0\x00h\x00\x01\xd8\x00H\x00L'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 13:52:03 executing program 2: r0 = socket(0x11, 0x100000802, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00002f4ffc), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000a7000)=0x3c7) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100636273001c0002001800010000000000070000000500000000feff0000000000000000a2e387d63e7217590578003f91160e12e5cab38ea6d14b05d0df915a3f958c4896775630"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/32, 0x20, 0x40020000, &(0x7f0000000040)={0x11, 0x4, r5, 0x1, 0xffef}, 0x14) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r7 = open(&(0x7f00004b8ff8)='./file0\x00', 0x404101, 0x0) fallocate(r7, 0x0, 0x0, 0x40007) [ 210.138386][ T8951] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.145635][ T8951] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.178927][ T8961] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 210.199681][ C0] ------------[ cut here ]------------ [ 210.205404][ C0] cbs: dequeue() called with unknown port rate. [ 210.205807][ C0] WARNING: CPU: 0 PID: 8592 at net/sched/sch_cbs.c:185 cbs_dequeue_soft+0x37e/0x4b0 [ 210.221411][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 210.228000][ C0] CPU: 0 PID: 8592 Comm: udevd Not tainted 5.3.0-rc6-next-20190830 #75 [ 210.236241][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.241572][ T8951] device bridge0 left promiscuous mode [ 210.246302][ C0] Call Trace: [ 210.246326][ C0] [ 210.246348][ C0] dump_stack+0x172/0x1f0 [ 210.246366][ C0] ? cbs_dequeue_soft+0x310/0x4b0 [ 210.246377][ C0] panic+0x2dc/0x755 [ 210.246395][ C0] ? add_taint.cold+0x16/0x16 [ 210.275832][ C0] ? __kasan_check_write+0x14/0x20 [ 210.280940][ C0] ? __warn.cold+0x14/0x3c [ 210.285453][ C0] ? __warn+0xd9/0x1d0 [ 210.289520][ C0] ? cbs_dequeue_soft+0x37e/0x4b0 [ 210.294550][ C0] __warn.cold+0x2f/0x3c [ 210.298787][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 210.304503][ C0] ? cbs_dequeue_soft+0x37e/0x4b0 [ 210.309525][ C0] report_bug+0x289/0x300 [ 210.313658][ T8961] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 210.313856][ C0] do_error_trap+0x11b/0x200 [ 210.326580][ C0] do_invalid_op+0x37/0x50 [ 210.330994][ C0] ? cbs_dequeue_soft+0x37e/0x4b0 [ 210.336022][ C0] invalid_op+0x23/0x30 [ 210.340181][ C0] RIP: 0010:cbs_dequeue_soft+0x37e/0x4b0 [ 210.345813][ C0] Code: 1d 2c b3 f5 03 31 ff 89 de e8 fe 6d a6 fb 84 db 75 1a e8 b5 6c a6 fb 48 c7 c7 80 7d 4a 88 c6 05 0c b3 f5 03 01 e8 0a bb 77 fb <0f> 0b 45 31 e4 eb b1 49 bc ff ff ff ff ff ff ff 7f 48 89 55 d0 e8 [ 210.355606][ T8961] F2FS-fs (loop0): Invalid log sectorsize (0) [ 210.365412][ C0] RSP: 0018:ffff8880ae809478 EFLAGS: 00010282 [ 210.365424][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 210.365432][ C0] RDX: 0000000000000100 RSI: ffffffff815bf786 RDI: ffffed1015d01281 [ 210.365441][ C0] RBP: ffff8880ae8094c0 R08: ffff888098d76500 R09: fffffbfff14ed341 [ 210.365449][ C0] R10: fffffbfff14ed340 R11: ffffffff8a769a07 R12: ffff8880a10ff000 [ 210.365457][ C0] R13: ffff8880a10ffac8 R14: 00000030ef9cd16d R15: ffffffffffffffff [ 210.365486][ C0] ? vprintk_func+0x86/0x189 [ 210.365504][ C0] ? cbs_dequeue_soft+0x37e/0x4b0 [ 210.365517][ C0] ? mark_held_locks+0xf0/0xf0 [ 210.365532][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.365546][ C0] cbs_dequeue+0x34/0x40 [ 210.365567][ C0] __qdisc_run+0x1e7/0x19d0 [ 210.365582][ C0] ? dev_queue_xmit+0x18/0x20 [ 210.365602][ C0] __dev_queue_xmit+0x16f1/0x37c0 [ 210.365617][ C0] ? __kasan_check_read+0x11/0x20 [ 210.365653][ C0] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 210.365666][ C0] ? ip6_finish_output2+0x1034/0x2550 [ 210.365679][ C0] ? __kasan_check_read+0x11/0x20 [ 210.365696][ C0] ? mark_held_locks+0xa4/0xf0 [ 210.365715][ C0] dev_queue_xmit+0x18/0x20 [ 210.365727][ C0] ? dev_queue_xmit+0x18/0x20 [ 210.365741][ C0] neigh_connected_output+0x401/0x5f0 [ 210.365761][ C0] ip6_finish_output2+0x1034/0x2550 [ 210.365782][ C0] ? ip6_forward_finish+0x570/0x570 [ 210.365798][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.365811][ C0] ? __kasan_check_read+0x11/0x20 [ 210.365832][ C0] __ip6_finish_output+0x444/0xaa0 [ 210.365843][ C0] ? __ip6_finish_output+0x444/0xaa0 [ 210.365859][ C0] ip6_finish_output+0x38/0x1f0 [ 210.365877][ C0] ip6_output+0x235/0x7f0 [ 210.442711][ T8961] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 210.447110][ C0] ? ip6_finish_output+0x1f0/0x1f0 [ 210.447131][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 210.447149][ C0] ? __ip6_finish_output+0xaa0/0xaa0 [ 210.447164][ C0] ? rcu_read_lock_held_common+0x130/0x130 [ 210.447183][ C0] ndisc_send_skb+0xf29/0x14a0 [ 210.447202][ C0] ? nf_hook.constprop.0+0x560/0x560 [ 210.447233][ C0] ? memcpy+0x46/0x50 [ 210.582855][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.589123][ C0] ndisc_send_rs+0x134/0x6d0 [ 210.593727][ C0] addrconf_rs_timer+0x30f/0x680 [ 210.598671][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 210.603614][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 210.609597][ C0] call_timer_fn+0x1ac/0x780 [ 210.614188][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 210.619128][ C0] ? msleep_interruptible+0x150/0x150 [ 210.624501][ C0] ? run_timer_softirq+0x6ae/0x17f0 [ 210.629707][ C0] ? trace_hardirqs_on+0x67/0x240 [ 210.634739][ C0] ? __kasan_check_read+0x11/0x20 [ 210.639773][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 210.644723][ C0] ? ipv6_get_lladdr+0x490/0x490 [ 210.649678][ C0] run_timer_softirq+0x6c0/0x17f0 [ 210.654705][ C0] ? add_timer+0x930/0x930 [ 210.659122][ C0] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 210.665282][ C0] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 210.670933][ C0] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 210.677000][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.683243][ C0] __do_softirq+0x262/0x98c [ 210.687746][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 210.692602][ C0] irq_exit+0x19b/0x1e0 [ 210.696773][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 210.702316][ C0] apic_timer_interrupt+0xf/0x20 [ 210.707265][ C0] [ 210.710207][ C0] RIP: 0010:tomoyo_check_acl+0x2a9/0x3e0 [ 210.715838][ C0] Code: 45 b0 0f b7 5d bc 4c 8d 68 30 e8 72 17 68 fe 48 89 d8 be 08 00 00 00 48 c1 f8 06 49 8d 7c c5 00 e8 ec ce a2 fe 49 0f a3 5d 00 <44> 8d 7b 01 40 0f 92 c6 31 ff 40 88 75 d0 66 44 89 7d bc e8 7f 18 [ 210.722916][ T8969] kobject: 'veth6' (00000000be4abbb7): kobject_add_internal: parent: 'net', set: 'devices' [ 210.735440][ C0] RSP: 0018:ffff8880a8d476a0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 210.735453][ C0] RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffffffff830a3eb4 [ 210.735459][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888096b3c5b0 [ 210.735467][ C0] RBP: ffff8880a8d476f8 R08: 1ffff11012d678b6 R09: ffffed1012d678b7 [ 210.735475][ C0] R10: ffffed1012d678b6 R11: ffff888096b3c5b7 R12: dffffc0000000000 [ 210.735483][ C0] R13: ffff888096b3c5b0 R14: ffff8880a8d477b8 R15: 0000000000000008 [ 210.735511][ C0] ? tomoyo_check_acl+0x2a4/0x3e0 [ 210.735529][ C0] ? tomoyo_compare_name_union+0xf0/0xf0 [ 210.735544][ C0] tomoyo_path_permission+0x1fb/0x360 [ 210.735556][ C0] ? tomoyo_fill_path_info+0x23c/0x430 [ 210.735576][ C0] tomoyo_check_open_permission+0x372/0x3f0 [ 210.735591][ C0] ? __check_heap_object+0x62/0xb3 [ 210.735603][ C0] ? tomoyo_path_number_perm+0x520/0x520 [ 210.735642][ C0] ? lock_downgrade+0x920/0x920 [ 210.799290][ T8969] kobject: 'veth6' (00000000be4abbb7): kobject_uevent_env [ 210.804668][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 210.804689][ C0] tomoyo_file_open+0xa9/0xd0 [ 210.804707][ C0] security_file_open+0x71/0x300 [ 210.804726][ C0] do_dentry_open+0x373/0x1250 [ 210.804748][ C0] ? chown_common+0x5c0/0x5c0 [ 210.804764][ C0] ? inode_permission+0xb4/0x560 [ 210.804781][ C0] vfs_open+0xa0/0xd0 [ 210.804795][ C0] path_openat+0x10e9/0x46d0 [ 210.804808][ C0] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 210.804819][ C0] ? kasan_slab_alloc+0xf/0x20 [ 210.804828][ C0] ? kmem_cache_alloc+0x121/0x710 [ 210.804844][ C0] ? getname_flags+0xd6/0x5b0 [ 210.817314][ T8969] kobject: 'veth6' (00000000be4abbb7): fill_kobj_path: path = '/devices/virtual/net/veth6' [ 210.821525][ C0] ? getname+0x1a/0x20 [ 210.821541][ C0] ? do_sys_open+0x2c9/0x5d0 [ 210.821558][ C0] ? __kasan_check_read+0x11/0x20 [ 210.821581][ C0] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 210.821605][ C0] ? __alloc_fd+0x487/0x620 [ 210.821631][ C0] do_filp_open+0x1a1/0x280 [ 210.821646][ C0] ? may_open_dev+0x100/0x100 [ 210.821673][ C0] ? __kasan_check_read+0x11/0x20 [ 210.827491][ T8969] kobject: 'queues' (0000000082fa5fc8): kobject_add_internal: parent: 'veth6', set: '' [ 210.832376][ C0] ? do_raw_spin_unlock+0x57/0x270 [ 210.832394][ C0] ? _raw_spin_unlock+0x2d/0x50 [ 210.832407][ C0] ? __alloc_fd+0x487/0x620 [ 210.832436][ C0] do_sys_open+0x3fe/0x5d0 [ 210.832451][ C0] ? filp_open+0x80/0x80 [ 210.832469][ C0] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 210.832480][ C0] ? do_syscall_64+0x26/0x760 [ 210.832493][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.832503][ C0] ? do_syscall_64+0x26/0x760 [ 210.832520][ C0] __x64_sys_open+0x7e/0xc0 [ 210.832535][ C0] do_syscall_64+0xfa/0x760 [ 210.832552][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.832561][ C0] RIP: 0033:0x7fa4c8bb3120 [ 210.832581][ C0] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 210.843498][ T8969] kobject: 'queues' (0000000082fa5fc8): kobject_uevent_env [ 210.844506][ C0] RSP: 002b:00007ffc67ebdf98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 210.844519][ C0] RAX: ffffffffffffffda RBX: 0000000000a4af30 RCX: 00007fa4c8bb3120 [ 210.844528][ C0] RDX: 00000000000001b6 RSI: 0000000000080241 RDI: 00007ffc67ebe480 [ 210.844535][ C0] RBP: 00007ffc67ebe010 R08: 0000000000000004 R09: 0000000000000001 [ 210.844543][ C0] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000004 [ 210.844551][ C0] R13: 0000000000420721 R14: 00007ffc67ebe080 R15: 0000000000000001 [ 210.850820][ C0] Kernel Offset: disabled [ 211.103192][ C0] Rebooting in 86400 seconds..