P_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x200000000000000}, 0x20) 09:11:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) syz_emit_ethernet(0x3e, &(0x7f0000001600)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5dc]}, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0, 0x8000000}, 0x315) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000)="006d4be80000", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 443.481066] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.487558] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.528592] device bridge0 left promiscuous mode [ 443.660430] IPVS: ftp: loaded support on port[0] = 21 [ 443.865266] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.872147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.880547] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.887504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.896398] device bridge0 entered promiscuous mode 09:11:42 executing program 1: ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mmap(&(0x7f0000450000/0x2000)=nil, 0x2000, 0x1, 0x40050, 0xffffffffffffffff, 0x61) getpgid(0x0) unshare(0x40040000) fstat(0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000140), 0x4) getresgid(&(0x7f0000000580), &(0x7f00000005c0), 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) sendmsg$unix(r1, 0x0, 0x0) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x20000000000b, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000880)='./file0/file1\x00', &(0x7f00000008c0)) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYRESOCT], 0x17) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffc, 0x0, 0x0, 0x100000009b4b62b}) 09:11:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) syz_emit_ethernet(0x3e, &(0x7f0000001600)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5dc]}, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x805000}, 0x20) 09:11:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x3, 0x914, 0xcc9, 0x2}, 0x2c) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8901, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000100)={0x7, 0x21, 0x1}, 0x7) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r2, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000000}, 0x20000000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000340), 0x0, 0x3}, 0xfffffffffffffed7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) [ 445.218814] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.225403] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.276931] device bridge0 left promiscuous mode 09:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x1000000}, 0x20) 09:11:42 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 445.513205] IPVS: ftp: loaded support on port[0] = 21 09:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x707000}, 0x20) [ 446.007011] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.013480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.020265] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.026650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.037479] device bridge0 entered promiscuous mode 09:11:43 executing program 1: 09:11:43 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000180)={0x0, 0x2, 0x10000, 0x5, 0x1, 0xf7, 0x15225efe, 0x7, 0xfffffffffffffffe, 0x7}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0xfffffffffffff001, 0x8, 0x9, 0x2, r0, 0x8}, 0x2c) 09:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0xffffffffff600000}, 0x20) 09:11:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8993, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000200)="adde9158b1bc8fb5259e0414767ca67fe813dd6f65756d4c23eddd6ba01928ee7091665ef21d2029b5a5362ad2d65585ba37fa39e834a1befc507cc8bdb9e9becef24d0d1aeb836948b387f7cb1c6ce32adabe4279f66bfcbb463ac79c93b23ddbd9e157535f"}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 446.294072] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.300680] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:43 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:43 executing program 1: 09:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x710000000000}, 0x20) [ 446.385160] device bridge0 left promiscuous mode 09:11:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000200)="e61e7817bdcf7976b0ff1b55a24f0f4bedb6617840d001f8a4c6caec3a5af10f0877ca0bc002560fed1b76a2c542653455f220c15fe0625b85614776cfc62e17f65917480dac420b3a14a1dc48ace6bf1bc6b2991edb495f15b9a4baf362ce395ccc5280a78bde8198983cbccbb37c81f69adfdbe15d21a3", 0x0, 0xfffffffffffffffd}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0xffefffffff7f0000}, 0x20) 09:11:43 executing program 1: 09:11:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:43 executing program 1: 09:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x9300}, 0x20) 09:11:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x0, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x10000) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000002c0), &(0x7f0000000280)=0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x4000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x930000000000}, 0x20) 09:11:44 executing program 1: 09:11:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8936, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 447.211559] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.218021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.224776] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.231244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.238877] device bridge0 entered promiscuous mode 09:11:44 executing program 1: 09:11:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000200)="abd503adb7db43836059f89566c18218a2903116353c46cd9ade7b3061ef8c985260589182ecc61461c9c5da9bb76390c522811ec3cd1588340ba7ccc3100156687d87e0361371f3485298896eec5e15b7e96c93f911a1eac3c8186800000000000000024865f7c59a6c5c14212713e60fb5100802803d265f564dde1ebf19bfd89424c35beab803", 0x0, 0x1}, 0x4) 09:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x60ffffffffff}, 0x20) [ 447.438765] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.445319] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:44 executing program 1: 09:11:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) [ 447.615451] device bridge0 left promiscuous mode 09:11:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x0, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x48) 09:11:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200)="8fadaf9bef9a1ef35cff8d9bb4aa884e4ca8c48bed9b27d4c56be95e72bc7ce6e60ac23fc13a879f40b8f771c45bb37989c91a6b55b7ffe209a8b8bc93e876b8615d943d550a5ef0034dca55914b8a48bcdd9322aa634ecebfc994e92773200971103ddaa941bbc3a39bec7625b73e11970b914cc52184908eb71d0735f66c96de680b601dafa5", 0x0}, 0x111) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = socket$inet_dccp(0x2, 0x6, 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000440)="36061f61892553044320b503abe1136b2addfdd1b195e354c93516a042fdaf4bf42af3fd676b42284eb416b013cbe07a43a1aaaefd68a69f451aca312ca530552e4b6d819da913c7a3de5296d3cf4293c6e4916d08097db4dbc74aa963aa7e32e9167e668c67d17092ed0fff231464fc726a810d0c89f4dd647ad86654e669337b8a2a31146f0493e7228525b9522fafb38cc321eea6aa29cbb431323c5b2ef07778328c676905bf81cc4e6450955317c4060485099bb35bc8f5a2473194f203b08fdb3cecdb60d97508ca731e4f8b9b3420a9f43bc38fc60e7be5a9e49c7b371ff521a17f87f57b97ef4ca33b88024c196aa17a358b4862991e6db646", 0xfd}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000340)="9ab9dc87d46671fe3c1fd2d7f2f67f26ddd75dc8f1c28260fef8357519f934823955d9e4e0e3b799a8627bcf9281d096328de4c664ce19633d749ebf0b8672bbfd6080a5ffa8e674e13ff74c80353138e0e614bdf32501b6fa6b41d54109007066a84e1e819041369448ff952cd3efa458604a456ec3233fa71144121b5ca2aa", 0x80}, {&(0x7f0000000000)="347b504523e10a2f70e86086936110ed650f674b24885db6f965f8ea672cbb695ab78286d681ecda89eaa0095402151928e0adf60ba70a9a0d07de22", 0x3c}], 0x4, 0x38) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000580)=0x4fa2) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)=0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x10000) r5 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000280)) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000d00)='security.capability\x00', &(0x7f0000000c40)=@v3, 0x18, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000540), 0x4) ptrace$setregset(0x4205, r3, 0x6, &(0x7f0000001ec0)={&(0x7f0000001e80)="68bcfa8f1ae25eefa47d9b409552eabb1cd8da30bed2db234aabdd3b359228ede31034fba3e6d90d0d58e61db8", 0x2d}) recvmmsg(r5, &(0x7f0000006940)=[{{&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/125, 0x7d}, {&(0x7f00000001c0)=""/84, 0x54}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000001e00)=""/81, 0x51}], 0x5, &(0x7f0000000680)=""/182, 0xb6}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)=""/47, 0x2f}, {&(0x7f0000000740)=""/35, 0x23}, {&(0x7f00000007c0)=""/253, 0xfd}, {&(0x7f0000000a80)=""/215, 0xd7}, {&(0x7f00000009c0)=""/107, 0x6b}, {&(0x7f00000008c0)=""/23, 0x17}], 0x6, &(0x7f0000000bc0)}, 0xfffffffeffffffff}, {{0x0, 0x0, &(0x7f0000005140)=[{&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/187, 0xbb}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/85, 0x55}, {&(0x7f0000002f00)=""/170, 0xaa}, {0x0}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/235, 0xeb}], 0x8, &(0x7f00000051c0)=""/197, 0xc5}, 0x63}, {{0x0, 0x0, &(0x7f0000005440)=[{&(0x7f0000000500)=""/44, 0x2c}, {&(0x7f0000005340)=""/158, 0x9e}, {&(0x7f0000005400)=""/59, 0x3b}], 0x3, &(0x7f0000005480)=""/90, 0x5a}, 0x81}, {{&(0x7f0000005500)=@nfc_llcp, 0x80, &(0x7f0000006840)=[{&(0x7f0000005580)=""/157, 0x9d}, {&(0x7f0000005640)=""/102, 0x66}, {&(0x7f00000056c0)=""/118, 0x76}, {&(0x7f0000005740)=""/4096, 0x1000}, {&(0x7f0000006740)=""/205, 0xcd}], 0x5, &(0x7f0000006880)=""/165, 0xa5}, 0x7}], 0x5, 0x40, 0x0) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f0000000600)=[0xfd]) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) 09:11:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:45 executing program 1: 09:11:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8913, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 447.961925] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.968499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.975208] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.981692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.988551] device bridge0 entered promiscuous mode 09:11:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:45 executing program 1: 09:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x200001e0) [ 448.296797] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.303368] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x0, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) [ 448.379770] device bridge0 left promiscuous mode 09:11:45 executing program 1: 09:11:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000200)="fe3ca7f0f4315f203cb2776e740f837e9c230fb835cac625fbf1026d38aa92769f289d3838e31beea045943d19587ef9d56abe552bf6f7636d26360f4c05c2663c75d88bd79dd9a9cb10285b07ac65e7c63f36071a7f35e9158a87d2174d9b6ec271514bcd3086641492b998f2a33c9cf87ae8481cdfa97a1470ad64f9176db2a9db32375d55bdc5a6be067315d31c20e4734fc4954b424fbfc8d6a1e512a51cd1beaab6f5d0d1afd540b23290d6ff9c78a93a80f58429c9e54c", &(0x7f0000000000)="a0ee589a8e4cacd8b76e9569fa8921aa11d7373354c63f8a39afa8b28e2b3c18fff9982921b95f69e7dc00138760a0b8abec3c9d"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) fsetxattr(r0, &(0x7f0000000500)=@random={'user.', '/dev/audio\x00'}, &(0x7f0000000540)='eth0/\x00', 0x6, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000500), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x400, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000340)=0x2007, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000180)="84119a51493679c542d734c71201cf2015ed2951451545cf947a90619bb220df4d19dd4d497e35ec8c49a02de56ad3a6de2802e8ede393030e", 0x0, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000380)="509478b70b93b45fd69e783397c7c51625aec23454ad621b0798c42a77153f642037ec2a8068401065bbfa07ec2d517fadec6fc55250e29b8a44af666c8a4f78ae827f99af56a3be17a962d1", &(0x7f0000000440)="d126458b04c95abd09d5b21a13234fb20790405640e0a78e34c9c4f976eeba238a3b8bcb731e6dd1560622eaef08dd27887cc3296e06fcdf3334d21dcddc809c53cc7c0fc83a2809069cc3774af74a0762e8f873b618ec8acccbb0fdf40ca142c0a2fc3938d42f804bd7f7815ea095965506b95b27f9130322ac22e232d1a690", 0x2}, 0x20) [ 448.815544] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.822109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.831412] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.838192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.847450] device bridge0 entered promiscuous mode 09:11:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x0, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0xffffffffffffffff, 0x914, 0x4000000005, 0x2}, 0xe) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x4, 0x80) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}]}) 09:11:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x0, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:46 executing program 1: 09:11:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x100, 0x80) accept$packet(0xffffffffffffff9c, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ec0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000fc0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f00)=@ipv6_newroute={0x4c, 0x18, 0x410, 0x70bd2a, 0x25dfdbfb, {0xa, 0x10, 0x94, 0x1, 0xfe, 0x1, 0x0, 0xf, 0x1000}, [@RTA_PREF={0x8, 0x14, 0x80000000}, @RTA_PREF={0x8, 0x14, 0x1800000}, @RTA_IIF={0x8, 0x1, r1}, @RTA_MARK={0x8, 0x10, 0x7}, @RTA_MARK={0x8, 0x10, 0x20}, @RTA_IIF={0x8, 0x1, r2}]}, 0x4c}}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000100)={0x3, 0x2, 0x96, 0x100}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r3, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r3, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000040), 0x0}, 0x20) 09:11:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:46 executing program 1: 09:11:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8001, 0x400000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x800) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000180)={0x2, r2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x0, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) [ 449.083757] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.090362] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x16800, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000200)={0x401, "69257845d2b428e5bcb1d33044195baafc2573f690e7c8059bf80cd443515640", 0x3, 0x18, 0x9, 0x400, 0x9, 0xf3aafac5ffbcf079, 0x4, 0x400}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0xfffffec3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$9p(r2, &(0x7f00000002c0)="3f63f586f3913d64dfbf0a10d470575d349ad083d32053da98ca2159d6b2917568b342641930239f10f6a09ecb270fa45df746cedc242f1e754c95ba9d27603c119fb11c583860159b3e62d236c7c20c1db00c3f53c80519d3318fcbfd44520335bcef6f8dc58143d7e70d160418d5a15daf96e34aca6da31128d5bf754f9028fa64a2d4aafa069e6d2e796fb6f15fc3402c4da0d996b43e2169e5f544df69c4a01d42f26666a862b6b02ea805", 0xfffffffffffffe73) inotify_init1(0x80000) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000100)={0x8}) bind$tipc(r2, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x2, 0x4}}, 0x10) 09:11:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x0, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 449.218553] device bridge0 left promiscuous mode 09:11:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xf34a, 0x81, 0x7, 0x7, r0, 0x7fff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 449.661736] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.668168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 449.674943] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.681373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 449.688180] device bridge0 entered promiscuous mode [ 449.698848] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.705386] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x0, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xe, 0x2, 0x578062b3, 0x2, 0x2}, 0x3f9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000)="5741bc785283603a2077a5b26873f441d814dd76d70825ab879418aa642e2ccdc6", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 449.714094] device bridge0 left promiscuous mode 09:11:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x400000) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000200)={{0x77359400}, {r2, r3+30000000}}, &(0x7f0000000240)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) dup3(r1, r0, 0x80000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 450.110115] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.117045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.125347] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.132196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.140967] device bridge0 entered promiscuous mode 09:11:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8992, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x0, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f00000001c0)='(wlan1vmnet0*security{posix_acl_accesswlan0]\x91self-\x00') r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x1}) [ 450.176323] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.184530] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.227676] device bridge0 left promiscuous mode 09:11:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x0, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x0, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000006, 0x50, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 450.887645] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.894318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.901088] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.907519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.914314] device bridge0 entered promiscuous mode [ 450.926938] bridge0: port 2(bridge_slave_1) entered disabled state 09:11:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000180), &(0x7f0000000200)=0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x402002) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) [ 450.933473] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.940311] device bridge0 left promiscuous mode [ 451.298565] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.304990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.311781] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.318214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.327136] device bridge0 entered promiscuous mode [ 451.338744] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.345303] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.352072] device bridge0 left promiscuous mode 09:11:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5460, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:48 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2, r0}, 0xfffffd60) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000200)="010067d711561970a0ba2ed031ea7c46487b9b438d39d41911621e1b89b53f4494d50e39cb7b6e44e70831d7ab1fe63c9adc67ddc97f4a3e00b28d21e74a4f7b0d0496f487274ba034cb46c78fd9d45016ebb362c2eea64f418fb1e8de5070651eefccf2af974f8749868ef6641c776cbf71ae38a28190dae79108347f16f2422d38af35", 0x0}, 0xfffffffffffffcdf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 451.557853] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.564948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.573577] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.580860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.590372] device bridge0 entered promiscuous mode 09:11:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = memfd_create(&(0x7f0000000100)='-+\x00', 0x5) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) ioprio_set$uid(0x3, r2, 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0x5) [ 451.761647] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.768262] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1ffe0, 0x400) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000100)) 09:11:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) [ 451.852044] device bridge0 left promiscuous mode 09:11:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x80, 0x4) 09:11:49 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@loopback, @in=@remote, 0x4e21, 0x7, 0x4e22, 0x40, 0x2, 0xa0, 0xa0, 0x88, r1, r3}, {0x4c, 0x8, 0x1, 0x6bd, 0xff, 0x1a, 0x1000, 0x9}, {0x7fffffff, 0x7, 0x20, 0x4}, 0x9, 0x6e6bb2, 0x0, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1a}, 0x4d2, 0x3f}, 0xa, @in=@loopback, 0x34ff, 0x6, 0x0, 0x200, 0x2ec, 0xfffffffffffffff9}}, 0xe8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000440)={{0x4, 0x3}, 'port0\x00', 0x0, 0x2, 0x1, 0x9a9b, 0x2, 0x6, 0x401, 0x0, 0x2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r4, &(0x7f0000000180), 0x0, 0x1}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r4, &(0x7f0000000000), 0x0}, 0x18) socket(0x14, 0xe, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r4, &(0x7f0000000040)="40f3a0d7869f950d636f4b0bced087fabb1189e6c02281a83a2b97a0d476d503f6b700ba46", 0x0}, 0xfffffffffffffd7a) [ 452.347287] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.353776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.354077] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.367042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.374228] device bridge0 entered promiscuous mode [ 452.391043] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.397517] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.404195] device bridge0 left promiscuous mode 09:11:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5421, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 09:11:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0xfffffffffffffcd4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = semget(0x2, 0x2, 0x400) semctl$SETVAL(r1, 0x2, 0x10, &(0x7f0000000100)=0xff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r2 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000000)) 09:11:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 452.621243] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.627710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.634491] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.640919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.647695] device bridge0 entered promiscuous mode 09:11:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180)=0x3, 0x4) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100)={0xac, 0x1, 0x5, 0x20}, 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000180), 0x0}, 0x20) ioctl$KVM_RUN(r1, 0xae80, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 452.838623] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.845150] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 452.945411] device bridge0 left promiscuous mode 09:11:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 09:11:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x50) io_setup(0x0, &(0x7f0000000440)=0x0) io_destroy(r2) sendmsg$nl_crypto(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@upd={0x100, 0x12, 0x320, 0x70bd27, 0x25dfdbff, {{'md4-generic\x00'}, [], [], 0x400, 0x2400}, [{0x8, 0x1, 0x8}, {0x8, 0x1, 0x5c}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x5e8a8fa994c4b578) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x200, 0x7fff, 0x2, 0x2, 0x4}, &(0x7f0000000700)=0x14) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000740)={r3, @in6={{0xa, 0x4e21, 0x101, @local, 0xe4}}}, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e23, 0x8000000000, @ipv4={[], [], @loopback}, 0x1}}, 0x3, 0x8323, 0x1, 0x200, 0x8}, &(0x7f0000000540)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000580)={r4, 0xe4, "a33095c4408059d1bb60d267e638f92b6b776002f97869fbb260c1a228a333348eb20cccb79384a2259ac43c40cef4a32a88ac7ab046cba1741e518076fe371a56b32f02d6eace7b99cd799663e76aee13cec4d0b53b71cd5b9bd93bd352eaddf7cac1c6026c02d21f605141d4b06844fdbe21df9078218345012283a25fb1573be6da09170239a0c75c6ff50dd1c1147c5ece4ba4292d7dbb019c1660d189126e35381b17a6bc3ef183c31ef015b2f3878bb2a98ea84dd4719bc80e794cc0e46ee427b3542bfe7af0b23cec2a108b47881d93d8032f5977c00ebcaf0e63c9ee64e6a97f"}, &(0x7f0000000680)=0xec) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000300)={0x8, 0x800, 0x5, 0x1, 0x80000000}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e22, @empty}, {0x2, 0x4e21, @remote}, 0x18, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000340)='eql\x00', 0x3, 0x6, 0x6}) [ 453.440017] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.446430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.453199] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.459653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.466383] device bridge0 entered promiscuous mode [ 453.473375] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.479983] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.486713] device bridge0 left promiscuous mode 09:11:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8942, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x40000000000002, 0x916, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000100)='trustedtrusted\x00', 0xf, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) close(r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 453.715683] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.722115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.728864] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.735226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.742073] device bridge0 entered promiscuous mode 09:11:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) [ 453.882425] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.889012] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x1, {{0x8, 0x2, 0x3}, 0x2}}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = dup2(r0, r0) recvfrom(r1, &(0x7f0000000880)=""/48, 0x30, 0x2040, &(0x7f00000008c0)=@generic={0x3, "8bc801bac5dc80ba71b6c183c7b91ec3c69d6821cf4124d83c0d8b294a9ac26a72f2fdebe07ed8ab19978ef925242d89bc58cfefd0aead80db034591cb495fa827881e53560a2e03914e74847b69912a3938fe930e666dfc783394be493ecc7eea2371cfaa21fd0b028fcf837ad8b7a9d87886edc1cd171ac790f0b9230f"}, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)="a1", 0x0, 0xfffffffffffffffe}, 0x20) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) [ 454.074632] device bridge0 left promiscuous mode 09:11:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)="748550838f6f33053ad7c688ead9c2591b9eb414ec2ceb0cc011f6cc30c7cb5efeee1862d6d719cf9fb6cd8e946f8cc33239c03efc0fc8b4ba26e05c8e3701b003b739a06d7ad2665c19aef83e6cff3b46959dfc5757225501c527d80ce45df9ad438224cc30fff9949cee76b3480154458a0c4c7a2ac2fca0246e", &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2000000000002, 0x3, 0x4000000005, 0x28}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 454.678678] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.685222] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.701118] device bridge0 left promiscuous mode [ 455.031708] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.038167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.044962] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.051381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.059210] device bridge0 entered promiscuous mode [ 455.066419] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.072888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.079595] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.085985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.106999] device bridge0 entered promiscuous mode 09:11:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8981, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:52 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x80000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r2, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000040), 0x0}, 0x20) 09:11:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x10000}, 0x28, 0x2) 09:11:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200)="8fadaf9bef9a1ef35cff8d9bb4aa884e4ca8c48bed9b27d4c56be95e72bc7ce6e60ac23fc13a879f40b8f771c45bb37989c91a6b55b7ffe209a8b8bc93e876b8615d943d550a5ef0034dca55914b8a48bcdd9322aa634ecebfc994e92773200971103ddaa941bbc3a39bec7625b73e11970b914cc52184908eb71d0735f66c96de680b601dafa5", 0x0}, 0x111) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = socket$inet_dccp(0x2, 0x6, 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000440)="36061f61892553044320b503abe1136b2addfdd1b195e354c93516a042fdaf4bf42af3fd676b42284eb416b013cbe07a43a1aaaefd68a69f451aca312ca530552e4b6d819da913c7a3de5296d3cf4293c6e4916d08097db4dbc74aa963aa7e32e9167e668c67d17092ed0fff231464fc726a810d0c89f4dd647ad86654e669337b8a2a31146f0493e7228525b9522fafb38cc321eea6aa29cbb431323c5b2ef07778328c676905bf81cc4e6450955317c4060485099bb35bc8f5a2473194f203b08fdb3cecdb60d97508ca731e4f8b9b3420a9f43bc38fc60e7be5a9e49c7b371ff521a17f87f57b97ef4ca33b88024c196aa17a358b4862991e6db646", 0xfd}, {&(0x7f0000000540)="8b11a98a0a9034bf9db1996ff53bff5ffb3f35afc38db57e2fcc7736476e825ad6593ecdf9c8cb372ccf09fd3c04c39c8f4da8dc354c73afafee0ee5b4505c370d65e22a9691183331eb0d51da2dcbacabf9bc3d046874e6722dd254662adaacdbe622b540eb0133d7ff09e24ccca2b09ef70db0035c2c2211560c58344c41003ad9b083d300e738e7a03e75f59ea8588a1f18fdd4ffc14bb1001ff288e27c6fb6896ea29cfddd2576b288c4dc25dbaf0a8b8ef54475334a11f65bfc14eb84ee35b8620412a5505de417414a0bbd828d2b845446254a4d1d555befd5355e10c623d46062ebac87eb7a8804aec350f1333601ffca5a3c1bddf24f51aa3878dd0cab0a6dee458a1d94ede2db4a49694e1adb5ad0731ef4b8a8dfa722aaadd0e4401abee3d09c3ab26cbd406482c89434a3de66e8f5ea01fdc2a3c3ae72099c217342d7b610c56cb48d283ea5024994f871df1ceea0b3c22322cfd708e874752b02b3ca5b4663586db80728317e367996048ad8b7d34a2440ca69eea04ce0fb1896da91f5741b45847bd728061f2315c784a2e488adec7aa02c52b1d16b1a26f3d7a3f7a1b6a7e7c664290496f3c2ca75425447f676ab1ab1b9edc15bec6f5b57c4c588f21a5d15e5c53821f57e1078e8f758b7c56e8e0682b4d8bc7d963074f1fe1856b669b62ade353fdb81a828640dc353e7f64f0896d6539fabba410af14069ab698d663360fb9daa40b3a13f8b90a212b08f778af8e6e5898f290ddf3b6cffa9b796bc4e7fcd2db0aa1a41fa386b1961c4b31e942c00c1e7a2e9491f43cb54980008677de07c95b2ef66e9fb0be93bdee352ec9b0dcf4dac96f5eca60021848288a6f830e881c0d46947fe2374d52642e97a1ed319d69c857e5e78ecb8d36c5ec8a5b19c165b6c9a73ecdd51a498a8e4826d2ac18ff53469e60dba707f4cd4ea840f1f3f04add2176003ac98e5d39fd06035a61e1cce3992fc58fd1d9c77512876fd3661ad4e89b9f7a3a8b8110bf5bbd338f5768a38f71b447a2acb517922d0083b996f753f695417327334d9cd7c1d30538b6877758f355fcd098ba4d4c34cc189934ce6bc4d0528709766e5a14af5395fd2dc67aa0d93053cc78dc479c55b74b4a21cda55cafccad935cb61c99883fefebc079b9c2388a07f509f0aff8eeec1279ecb1b177a49ec51ad991077025698ca62a498be6fe403999e62d81895464cd29776b9a2bc3087e03e55f51afdde52fbc5ece8916168f614f4ce08b4efe425ba1658868594dce900260d215bb2d347bd90b29ad8fe2f49e6f57a7317da7f9a933396751c1e730fe8564f69f12cf0d824c3e162277da920497821c3e7876a2ba699fe8bd4d561c37a8f76b4a1012ae049485ba278b777594384a3d1a8e687b047543bfb050f1f22639d4092d61b0759b627140fa1921b26824c9a28b07173bfe6fa732fdb9e93cc528fd401e7280b433835adfe9fa90e6014dff2beaa67d3e753bde8c22ce22f89844d4075bbd27c20e343a99f8e2d877a6109aabd5fe1ee3a68b4e6e5d1dcfe0948a8b5adce5276e4102f35a26eb626042d5c9fd97a226be3fefec3a03568b098a5d92af27a2a45d6c35c8f5c9e2b4c5995bf79c2f4c4b4750f4945ba15420c82370e2d392116b498444e4259476d36c6321f6ad875f4b2dbaf3a712f2f8aee9633e10164aef5bed1862e4065c3c8b468fb8f5771ee73b497d155ab6323fce7f11e6cecf7e92a70e44a7ab2d5285a53bf3c67474a2000c9d092e65eb70f122a643695283b798c69f5db08e3302f6ff52dddd41c8d66c09f1678f62cc2e1b9f21ed21a326dc781d2a965051641686e9aecca702c4c52109e097a9ae2fb8758a0b208cdf0feb4653a0bddca4720ba4826a9b34f9fb9988cdab7ba52b8e809e244b9ee95e277397d1141c5d12b5b74073bcc13d44c89701b14ff775d15f1ef74df969b944140236f5ccbb6db656eadc96eec60339ea4b8d59ffa78e036e4279bf6258e6021425a78c3b23117e5e1dd9ee28cd3d7192cc80fd7db37106a59d491598874cb30e1dacb8c7d3e53d32f9f148e883595b91af9f5429068fde7e222f35094a65084726ecdc6af5dbe3d3cc58cf2fbe6ec74a1e7ce502afba2003769054354e64988a3fcf4488761458037b63e5c115ab1083f16f827fc28727e004fa27edd842c3d0db95799c4d95a58543f8bda3b96f4de1af432ac79426491eb16c931157b4024ce4d7df0e851d53c5ab2ffb1e436ac9e98e43b16816019c54c2fd96a8a47f3e275d59fe591dfce625a7a2409c60588bd93e9ad3df73c390007fa08d48d5ce8d533b17c5e4c34255bb49afdd4f3758e52eca8f657b0889e9d9250dd52f23aa1a8597635f6833d217fc512ae16572f391e802449b22c6617fdb7bedca82b348884e87f3ef4e80b6cb3d910fa9686e413a5ab0446af8b7b01f308984fac34625f8834443ecb05edf85a860e6e4de554201378362342d6f9a279537fd10e2a09132696b79b6694793dfb48a59fcb76745121fe97afcff7c1d275afc2a4d58ff25b15b735d5caae2b69d741c8030b7a6cdb9e2b816def6b1985bd7c50267cf8a883ebc7446417f6f3f539b9466a896d7cc38b45cf174d83ceaf8c4b6ddd63e87a5fe817254d31f18a444af5bb2507485e6381493674b65e870c9043146d43dbe138f58514bb56a3fc537a697595f59efe893427435085d9e61620e30d3bb0ddc1668c0651e202357acfbe57da77860542d95a41e651ecb0d6f50a88a8566704ec12b057fe358b78fd927372bef9a8bbff8011f503943e6c46215da24df090311b2654c91a60126666e170a1d1063c0d670003400ae43943e524dc81220494dc4675636ef0fad673eedf8457f2615de2022340eea68f779da5e397cfdafe283f42a533fcca242c0e4b940214c3502d0a24ac750eac776633ab134cfa341997b1cbf14d0cf9481d4c2a57c28308432262e51c24d296948f1299f32da2be89bf70b605678839179eaec84ee7428ac9efbd99829fff104c495964084499983a038b759c713aa1d03990b8e060d0ceeea8dad0bf52eab8c13599078d3f9132a6aa71df225782a53439d7ae2271d3e2bf20e68a5ffe71426863634e401cee314502cdf9244f30e0cce2cc7f385084adb11d6d8daaa59a043b2dc7b1fe996d7a928704a3d4b4c37162e07291a1d5f7a022e406bf6d12fcc072109a040473c07e24f976ae10597a750168766565e9ee30385cc31564f587b7a2263d8beb9642339a8c916a860bc02d9a77820958bda8ca70850c53e75037427aafa8103f9d9a6370858f69ade0ba4d777d532b06995b6882feecd1de69842f3b1f17efa3ab4154176e2b760bb2db6efd290850953cd2428a0033c1d803ff37090f60803efea9e75f58e119ae3ad5d4dafa74c33c490d9ca3b4706713c8f3a8903b5315765db1f74be6515dbb87974ecfb7288e404785fbbc1426346a682799f2b807873b6edeb146a79a46737623bf745aeea79935d814398e61317b6d85a4962a6ad80f7b64f1f18dfea58330ba565bdf291b2b670f036f30858dd8fcf814f73bc789b184e3335000a56c4c7464dec3a78b6ac35b4e38052a3b50095140cb62b23e6c6fed9245973d48d5c6bcf4bc421b24cfff5d543cdb558c127c7c0f546b07bea367fb0a995ba1a032a7b16b9855e0168980e06fa19f7dec8f6dedeb9f86bb63780888bb5ffc5e4561344c597f05af0df674fa9da3b1f9704eb6fa596ae59bcfece86516d16ac943d8f4d4ce2363185bf58352c1fa15697d8d8fbde64c3a0ea5870f367e2634547f61b51fc13cc5dd66abd8f966f419aecc6d828e1e2bdee2511cbce3050fba2cca2b9cf2a13e38a081566e7ef8a7a004411de572877009cdbef6eb33cd1217c503fda3b50f56de27e24b39e04a529acb5dbef86de87b8bf5e6b75abd99b5ade110a8e55aa12c4dceeaeafa8567a254378b046bbdb7cc4226f6cb87b28d943bd3245f9f39310cae2e3176bcf49b436205cbf37b60c030e90acc22696dd8e7c3e0f960c740ee7135de985f795f9b2d7d61610e44a471dda8f0e51afd415f939a152cfce9e762ec07fd21c861f7b8f4bbc073aa57bb03fca6423bf88db72d37304364f75a7727f3e268a527a9912f8656761d2a292c1748d30b289a921eb5327fa4d32a6e4a0a5eca8e3aac216a9f002421265eca394ffd5bdccc0956194d7d634425d7205dfc1b55e632e6588e258f0feeeea22f9b2aaa4e9821bf5417665700811df057ba47626a7d91fa40f8cf71c7872c16c5975d9f92313c59a8ead79639eb2919458fbcb833b48427fedfb956c9d4157a100cf493e454552658d836ad4aee7dfe7b8e7c2b2631cd90015fc6c6229c049fcd25dec836180741f121e68cd161aa4e2335b61c0f1325f88978704818496ed25dbf54e5adfc674ae45c92ec2d22cdad82a8833485345ba9764c7a64bed666354d29b3c49e456990b6f43c4f31049539664b784617ca123a56e2f3098dbc56e07469cb93faa00c0c23b42a8a28f7a9c5dc94c46c28e995a97b02bf54af6c3440185ae9911a2d064234ddca9c5f6a825baa24b955ac69d34004f4bdff77d493dcd179c8e1b624d21b4b6e5f8f5952c6e377fdbe8dc2a98da41116127bc17e0fadad3e0782701005a130be1e04c646e8e13687d3237cf8dd14520edff0440559aba763bb9a9a84d0400a03ee74829400b26db14b2c3465abc4a45180d6b28b0c637102fe85f9e527b9c3cf72dd8b2699a854dc7cbcef196440213c7481582f1fa3bc0cb04211f6ca7fb5232d1e2928f2532cfeeca1b497e662cf4bffe624b827386a3975c65a7bffe25b03e1b538e236066f7f3561f3d0bb268551389f54fcf7109a267c6250e4ed7ba72fc9b7ea871c1d2062db00719300856bbfe2a8eb8905ee694d716d5c0e0493ebda965a6adb681d287a46f18e3bf66839ecd2865cd214d917ae215f98e86160f8322ced43dbcbee53f96daa4a5c4c7cad7bf5b606767df00f8e469299eb4320c2c748921f94a97ef7b89cd210aabc270ccfbf4325eda5b31b86842e004802342ea08c433569dd7a09a37f1081cd6b29ce2f93fd627137304d975c99c4552400dc0aa98158cf7b631db86469038adf67b293403965b83d5f3fb27c0eee2c720c2bf8d2ad6d8149653379c4e3f6951dc95e6f7af7f23fa3025f2192d1f60abd3f3b05f949d5a2b7a2c7e7649cf7280b004222ca03513c81042c4d486c7afa11ad476bdd0900ff4b1b4650438b7576dd77f31777e20158597add754888fdd9dde4e2feac10cab9368797ec81f6a1b8b77ae0653f5430d111b647db3fe537f7ccac5c763c038af20c7a2590f5382aab22b843ec3bbaa99abc40571e8c684b56686f31d7051dadb03b5984d4fb6f7c2f95bf22811cf8fe53d5c1d8e149b7ff17edf005d76c1eada84850d7d5dc3197d3890628eba00417c945aff4d185363554e8b7972ebfed502954ae2e0c251f4252f93617ee856aff677c29a2253bd579092b1026d09706804d9a74e712d5f807cc41c51b0be917b3c62df0c9ee135e68c6d528cd4ce3fd8cf3f110b4aa4dc637a1ce6290bbdcabd4e10528a5c66c5d811ee1ced0b4ff562aebe5d6e0a80a3885de3b33e9bbec353920a20827f692548240f6939b2136a00af3ab8678c916fc20e33bad30e1e5d0c9f2f2a1c10cb2db72a19a127ec11b783667d780367c3c32b5f21e51fe941591008203a6a1a1f2461d1826cae70ca32541c6b8dda2321ffefc4bdbd42f1380f1a6b39ea5a7f642587d", 0x1000}, {&(0x7f0000000340)="9ab9dc87d46671fe3c1fd2d7f2f67f26ddd75dc8f1c28260fef8357519f934823955d9e4e0e3b799a8627bcf9281d096328de4c664ce19633d749ebf0b8672bbfd6080a5ffa8e674e13ff74c80353138e0e614bdf32501b6fa6b41d54109007066a84e1e819041369448ff952cd3efa458604a456ec3233fa71144121b5ca2aa", 0x80}, {&(0x7f0000000000)="347b504523e10a2f70e86086936110ed650f674b24885db6f965f8ea672cbb695ab78286d681ecda89eaa0095402151928e0adf60ba70a9a0d07de22", 0x3c}], 0x4, 0x38) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000580)=0x4fa2) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000240)=0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x10000) r5 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000280)) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000780)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000d00)='security.capability\x00', &(0x7f0000000c40)=@v3, 0x18, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000ac0)) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000540), 0x4) ptrace$setregset(0x4205, r3, 0x6, &(0x7f0000001ec0)={&(0x7f0000001e80)="68bcfa8f1ae25eefa47d9b409552eabb1cd8da30bed2db234aabdd3b359228ede31034fba3e6d90d0d58e61db8", 0x2d}) recvmmsg(r5, &(0x7f0000006940)=[{{&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/125, 0x7d}, {&(0x7f00000001c0)=""/84, 0x54}, {&(0x7f0000000380)=""/76, 0x4c}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000001e00)=""/81, 0x51}], 0x5, &(0x7f0000000680)=""/182, 0xb6}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)=""/47, 0x2f}, {&(0x7f0000000740)=""/35, 0x23}, {&(0x7f00000007c0)=""/253, 0xfd}, {&(0x7f0000000a80)=""/215, 0xd7}, {&(0x7f00000009c0)=""/107, 0x6b}, {&(0x7f00000008c0)=""/23, 0x17}], 0x6, &(0x7f0000000bc0)}, 0xfffffffeffffffff}, {{0x0, 0x0, &(0x7f0000005140)=[{&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/187, 0xbb}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/85, 0x55}, {&(0x7f0000002f00)=""/170, 0xaa}, {0x0}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/235, 0xeb}], 0x8, &(0x7f00000051c0)=""/197, 0xc5}, 0x63}, {{0x0, 0x0, &(0x7f0000005440)=[{&(0x7f0000000500)=""/44, 0x2c}, {&(0x7f0000005340)=""/158, 0x9e}, {&(0x7f0000005400)=""/59, 0x3b}], 0x3, &(0x7f0000005480)=""/90, 0x5a}, 0x81}, {{&(0x7f0000005500)=@nfc_llcp, 0x80, &(0x7f0000006840)=[{&(0x7f0000005580)=""/157, 0x9d}, {&(0x7f0000005640)=""/102, 0x66}, {&(0x7f00000056c0)=""/118, 0x76}, {&(0x7f0000005740)=""/4096, 0x1000}, {&(0x7f0000006740)=""/205, 0xcd}], 0x5, &(0x7f0000006880)=""/165, 0xa5}, 0x7}], 0x5, 0x40, 0x0) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f0000000600)=[0xfd]) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) 09:11:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x8) 09:11:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 455.380675] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.387403] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.461693] device bridge0 left promiscuous mode 09:11:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x915, 0x4000000005, 0x3, 0xffffffffffffffff, 0x10000000000159}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xb, &(0x7f0000d06000)=0x5, 0x4) connect$inet(r1, &(0x7f0000000140), 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f0000000040)=0x1, 0x4) sendmmsg(r1, &(0x7f0000000040), 0x4000000000005a0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x22) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5452, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000000440)="09e7e843fc0d97294b27a33502f2526fab578a9ed31717d6a869fd76589d44826c9ff07dac577a4c2e41887c6c5dc900dae0f738decc19a6ab5ebb1c01df0d574ef3ed41de5614566c76b6ca018e9e4e54dc3697c44883ea970f3a6641fca38eabe4f7c3b638a9c95e7279b0e1979f8f805d60f8888bf9ad4e6531f7af5b1a1ded1ef4352a82fc97b9d6a72b8f08d5104561136ef3cb86aadb54c4fa397a59c2941499ac5c1741bbe4c45d843cd24ce17b9e6fb9294c2eb0e4bd49591dfb814600a71d2df6643cb5242f08290416480de43664cbc8ed689e8ebef351facf2547af0a2d4f801d67e8", 0x2}, 0x20) 09:11:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000200)="a79e5786bf9b21500430c4e0369fa8a6ef9420f24669a689e90192e8669865eed38b8f403bda00ad24ea07fc7a27d3eab2e4f1ef4a8593c1343a0c1a40d2ae970ee581201d95008ac1e2a3f20795a2483888b2f710d2214b543d88ce00000000000000000000000000000000000000", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), 0x0}, 0xffffffffffffff38) 09:11:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) r3 = geteuid() syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x80000001, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000200)="982a0f85f6b69c2b8e080ae75569bfcd8608afbb5e129caf13d1fce5b37cd702e93c92f5b6520fa71d264762916c7668e6d0aa734e57c6734005a7ad515783c29e8c33883b81973d5f306cc8233431ea8c27ccd22688f9f267f5aaf1337d1c2d928a8aea29201041c4fb2ac023dd827bb9ad643396336442d793cd530c009695a37ce8339e9beea59a7e4abc3bbee78fe59b46c32db6189e35b239969535ef220c46bc4f6772925ed71dbac1c599ce748f7b512fc0268796de0ab96068c057eaaafbe02080e53d981493ae7be3e771ad718f4239", 0xd4}, {&(0x7f0000000300)="7dbe5d2bbb7c40aec55d4c8bdc6bb3c7b93f9e8c5ae79c6d88904a28589ca74a870b361adc2f3005a85727d33da7beaa8d1801738b3100c9fab5b4a0034cc2a8f0f3a4f7365dc20b0cc1eada9d69d8ad7da024339986b1f6b1b87cef77c9ec676b3acd7a0291306b6cdec049c35f218380596aee12bbc3b06011f8d9672c30df1948fe37777b58702c", 0x89, 0x401}, {&(0x7f0000000440)="c4cc90b20df41b1462590fd5d26198bd9b11163902eb31b28156d51181b4cb5f0e8f66181d55a0dd761475925c4b62d6024ed84909aafb1a3e02699e9fc03b857787b0d0b3ed5a80dfe0032e8627b9ba3093c0a6ac50b1820c688682f948867da849e50831551b780445fca45c0352d89f677bbcd13fec0ff0e2a6dfaf8e7d96e7d3085dc7d361ae4d11d81bc790b2a6c95d95c697f5f441d1d235c43aa13cb2aac1a3b9f058f79d46f6f1c030e2c45478b67cc6c83cb9cfc36a552c35f9b4d8d212e5ff2ed3bed20c7362c1032e011fdfdcec7d8d1b0f81d37f72baf4d3acc9b3d1e4feb088d7f05daf9a8f96a72b87833f863cca", 0xf5, 0x3}, {&(0x7f0000000540)="3617348307cbbe802b13ce3e17fe23e941a4b355ccc7b5cd4502aa6d240a76351c34f2043404f7e7e4763a8878f497dbb92f0622e2d12ef24ba6912175b473a5fe246f9608eddbff16dbd1841330695f4990f4b8a1a51a3a5b9e167b9121a5fe59474a973dac4c6e0bdfe7e5e74f3f19", 0x70, 0xbaa}], 0x3004020, &(0x7f0000000740)={[{@check_strict='check=strict'}, {@map_acorn='map=acorn'}, {@utf8='utf8'}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x8}}, {@cruft='cruft'}, {@cruft='cruft'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x7b, 0x64, 0x36, 0x37, 0x66, 0xc29ff50a6025e65f, 0x65, 0x7f], 0x2d, [0x32, 0x63, 0x62, 0x7f], 0x2d, [0x39, 0x62, 0x7b, 0x65], 0x2d, [0x31, 0x7d, 0x39, 0x77], 0x2d, [0x37, 0x77, 0x3e, 0x7b, 0x3d, 0x36, 0x38, 0x77]}}}, {@obj_role={'obj_role', 0x3d, '*selfbdevposix_acl_access)-]-'}}, {@euid_gt={'euid>', r1}}, {@obj_type={'obj_type', 0x3d, 'selinuxnodevposix_acl_access/'}}, {@appraise_type='appraise_type=imasig'}, {@uid_lt={'uid<', r2}}, {@euid_gt={'euid>', r3}}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 456.278653] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.285102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.291879] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.298275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.305530] device bridge0 entered promiscuous mode 09:11:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(0x0, &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 456.422260] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.428854] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @remote}, {0x2, 0x4e24, @multicast1}, 0x2b, 0x0, 0x0, 0x0, 0x4, &(0x7f00000000c0)='ip6gretap0\x00', 0x9283, 0x8000, 0x8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x20, @tick=0x3ff, 0x83a9, {0xfff, 0x5}, 0x6, 0x1, 0x8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000200)={0x100000000, 0x4, 0x0, {}, 0x1, 0x1cb6}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000100), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r2 = accept4$inet(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10, 0x80000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@nat={'nat\x00', 0x19, 0x4, 0x598, [0x20001540, 0x0, 0x0, 0x20001818, 0x20001960], 0x0, &(0x7f0000000340), &(0x7f0000001540)=ANY=[@ANYBLOB="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"]}, 0x610) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, 0x3, {0x0, 0x2}}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000440)="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", &(0x7f0000001440)="107cbea45afecba82a33af6c476e59e69e502ed3108aa28e0e6eac40aa04b928b8a4fb9e4261c0b4da51eb386553ed8ff7a7c6616596214e1616e79dff5e1f4abae2f38822b068f181f0634e8efb30659049ed23a555de0a4daec2e7f290bc4b158ad8bd68572e14cedf864165184e7cdb372b7f11fd143d9dcb197d36f608fde46d6d66b616a635337509b37df4612896b4796e0964f65baa6de5b4c2b666e5ed94394d9ab4eeb7b72d2deabbc2ba0b213e518913ee9a8c2d801f4f4f9423107e285cf3802c2fa9e5f5996416f8d3532b356de5abba811bce691fd90fa8490b7e86c31e408f0ef8833b95b9b9", 0x1}, 0x20) [ 456.630816] device bridge0 left promiscuous mode 09:11:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x2, 0x914, 0x4000000005, 0x2}, 0xfdff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r0, &(0x7f00000003c0)="05e6e5b27b", 0x0}, 0xfffffffffffffff6) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000000100)=[@increfs_done={0x40106308, r2, 0x1}], 0xa5, 0x0, &(0x7f0000000200)="cf56c83649512292633546af2941b2aa6dcce95f8bc10cb09831573b4ac265ac624c17bbb99b74398c0094473e816e1eb815b8cc127752803afe9d2ad9e4d7844bd512ac53f638ea9f3cc9c694c40a5cd2981af1d43e8f35456ca2b149b1b71e3e823a6035e7f82f3b988e329283c2dc0ff176470e0c6d405471363253f0283c5a4334b7682681312ca3ef7848ae3012c3683af7dd8b2bf133518d02e76df08602527180c8"}) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000002c0)=""/135) fcntl$setsig(r1, 0xa, 0x21) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000200)={0x0, 0x0, {0x3, 0x2, 0x300e, 0xf, 0x6, 0x7, 0x3, 0x7}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) connect$bt_sco(r1, &(0x7f0000000100)={0x1f, {0xff, 0xd2, 0x7, 0x20, 0x2}}, 0x8) [ 457.077912] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.085001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.094533] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.101619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.110804] device bridge0 entered promiscuous mode [ 457.132896] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.139395] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.146004] device bridge0 left promiscuous mode 09:11:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8924, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400001) sendmsg$tipc(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="9a1c13746f80c78e1a1b8f9746b08bf7557a454f84c1370f4d69d3ac94ffe20652cca3b578986f07d089b217ee52375098ccc8919f987ca0ade5cdc5c833d1a426bb4ecfd6177bfc2b0ab1eaed73853655a341a1a5483e091e455138cdc23e19c2700a30dd0bb519e53c643fcc648ecffff96a", 0x73}, {&(0x7f0000000200)="59987a0351982906744a697380660d5983b2e16bf77e70ce88a67309788328baae1a998c24fca88867c48db766bc804006cfd44e235ba507e5d4c5a27cc40f56d081faee04729fceb3373a8dd136cb5ed37bad49ab5affab17a49c749dd0bcfc85e53495b61dbcab89020486569d33ef5ce2f7b2fb6c87f5c2b1323da47d77efba62d6d7fd", 0x85}, {&(0x7f00000002c0)="f2e04555369f759ca824960b74a511c821e5bdec3fa6d8a4c677b85cce39041299eb821686f5e7b619735910cf7f0fe1169dbfee41dd42782db64652f7d0d0040b0463101f48cb9d35a67a92bc51109e467ef71cf4386f12e04191f0140ebd868d760a933276e612eaf052cffd70774ffc9e4fa968396c759ae7ab69ff414ebddad5dd0c66aa7479bb8ceb6b2c8ef26d3b2cb28ff5b292b049fc", 0x9a}], 0x3, &(0x7f0000000380)="42d9087f84fe3569b6", 0x9, 0x40000}, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x8) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x10000) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000200)=""/186) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 457.374210] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.380645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.387238] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.393653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.401158] device bridge0 entered promiscuous mode 09:11:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) msgget$private(0x0, 0x48) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x11fd3a5a3dcdf784, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000180)={r2, &(0x7f0000000200)=""/222}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x3, 0xd3, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000200)=""/211}, &(0x7f0000000100)=0x78) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000140)={0x6, 0x10000}) 09:11:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0}, 0x20) [ 457.559537] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.566110] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.644726] device bridge0 left promiscuous mode 09:11:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0}, 0x20) 09:11:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000100)="33e272c7f21e5c9d8ff7f929aaf500203de43600", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x40400) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x1, 0x1, 0x9000000000000000, 0x0, 0x11}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) [ 458.148630] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.155213] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.161757] device bridge0 left promiscuous mode [ 458.380144] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.386623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.393389] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.399784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.406608] device bridge0 entered promiscuous mode [ 458.413383] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.419879] bridge0: port 2(bridge_slave_1) entered forwarding state 09:11:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e0, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000380)="9cf790", 0x0, 0x1}, 0xfffffffffffffe5e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000)="049ae996f5212610ca85f4ae606ce22d440cb2f2e15a4190a803", &(0x7f0000000200)="ee82403e7e171184df63420ed7dd17f3d59e6cf5efeac1add41221fa7b2b3c92e96612e365f5d7288c39a41da37a2cce4d999861eef5035a81884b0864b6e58e2562258664812d0e0a40c0a915e8a81e2b2dafff6b4ee89216133a48b915bff6451be99ef9c603c76815956994439940b3d0bcd46c803c538ff3d84782d3c775f8a550cd3676484a0ee42eb389038bccb8c1ea623006"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0}, 0x20) 09:11:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) creat(&(0x7f0000000600)='./file0\x00', 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0xc0800, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000440)=0x40, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='maps\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000200)=""/30, &(0x7f0000000240)=0x1e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x6045}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={r3, 0x9, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x1e6, 0x8440) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x7, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbcda, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, [@call, @map={0x18, 0xa, 0x1, 0x0, r0}, @alu={0x4, 0x7f, 0xb, 0xa, 0x3, 0x0, 0x8}]}, &(0x7f0000000500)='syzkaller\x00', 0x3, 0xbc, &(0x7f0000000540)=""/188, 0x41100, 0x0, [], r4, 0x7}, 0x48) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='./file0\x00') write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffffe, 0x8, {0xb56, 0x0, 0xedb5, 0x6}}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x200008924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=0x0}}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x100000000, 0x10803) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f00000000c0)) 09:11:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 458.426546] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.432928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.440530] device bridge0 entered promiscuous mode 09:11:55 executing program 5 (fault-call:1 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x17, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r0, &(0x7f0000000440)="d0e10ca7ce62e2141a0bfe5a16954593537b7a34f5c60d82e3f8a5263188fa66db750077ed05f550cbf10e7c6a3a4fde1a67ca0fa87c9e40ad3d145f372021d6ccf33a62d332a2aa4d48ba532f9ad1443b85498eed0472870ef7fc22d66df77f773f06e87c895475665322d82f72553371251710fac54da71e4d182d2eb35183e3654dce1b67021f6ad35102534d035fb5252cd1d57a4359fbb37d20bd7ca417d88ef476fad85c89a42413656abc22", 0x0}, 0xfffffffffffffe03) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x2de6, 0x2) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000200)={0xd3, 0x80000000, 0x10001, 0x7f}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x9, [@random="0519a33ad2b3", @local, @broadcast, @random="da8b32556dbe", @random="24b7858ca9dd", @random="98a3cbc2125a", @link_local, @dev={[], 0x20}, @remote]}) setsockopt$inet_buf(r1, 0x0, 0x37, &(0x7f0000000340)="253e69b749c0cc93eb5baf638cbac39a08c1f0d8e5633f3ef0e126e2fa893a556bcfb01bef5528ca9acca82288421d249a7a5c2958730feb1812523f62e05c74126f4692f7bd5f8b68246b350591feb1ef0818a69d289c9cf00811fdf5ec5458fc6ae85967805e1ae2e69c83c39592caf44031abaf07e80b4666f75cbd50b926f1fabef17d24c96aac24a6d74c470a11f126e009f40e25a28bb3a5bc", 0x9c) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000540), &(0x7f0000000580)=0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000100)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) rt_sigqueueinfo(r3, 0x8, &(0x7f0000000280)={0x4, 0x7fffffff, 0x73f0}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) 09:11:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000038c0)={&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)=""/22, 0x16}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/245, 0xf5}], 0x3, &(0x7f0000001680)=""/154, 0x9a}, 0x2000) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x2b5) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x0, 0x5, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x72, &(0x7f0000000380)}, 0x0) [ 458.628830] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.635439] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.663630] device bridge0 left promiscuous mode 09:11:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000)='@', 0x0, 0x2}, 0x20) [ 458.701140] FAULT_INJECTION: forcing a failure. [ 458.701140] name failslab, interval 1, probability 0, space 0, times 0 [ 458.799953] CPU: 1 PID: 16795 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #160 [ 458.807389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.816756] Call Trace: [ 458.819372] dump_stack+0x244/0x39d [ 458.823031] ? dump_stack_print_info.cold.1+0x20/0x20 [ 458.828249] ? debug_smp_processor_id+0x1c/0x20 [ 458.832939] ? perf_trace_lock+0x14d/0x7a0 [ 458.837196] should_fail.cold.4+0xa/0x17 [ 458.841278] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 458.846410] ? __fget+0x4d1/0x740 [ 458.849897] ? find_held_lock+0x36/0x1c0 [ 458.854081] ? get_mapinfo_hash_bucket+0x48/0x110 [ 458.858959] ? perf_trace_sched_process_exec+0x860/0x860 [ 458.864442] __should_failslab+0x124/0x180 [ 458.868710] should_failslab+0x9/0x14 [ 458.872537] __kmalloc_track_caller+0x2d1/0x760 [ 458.877215] ? usercopy_warn+0x110/0x110 [ 458.881298] ? map_update_elem+0x286/0xf60 [ 458.885548] memdup_user+0x2c/0xa0 [ 458.889121] map_update_elem+0x286/0xf60 [ 458.893205] __x64_sys_bpf+0x32d/0x520 09:11:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0, 0x800000000000}, 0x15) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 458.897117] ? bpf_prog_get+0x20/0x20 [ 458.900966] do_syscall_64+0x1b9/0x820 [ 458.904888] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 458.910271] ? syscall_return_slowpath+0x5e0/0x5e0 [ 458.915209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.920068] ? trace_hardirqs_on_caller+0x310/0x310 [ 458.925104] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 458.930140] ? prepare_exit_to_usermode+0x291/0x3b0 [ 458.935183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.940054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.945254] RIP: 0033:0x457669 [ 458.945273] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.945283] RSP: 002b:00007fd3a503ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 458.945300] RAX: ffffffffffffffda RBX: 00007fd3a503ac90 RCX: 0000000000457669 [ 458.945315] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000002 [ 458.967428] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 09:11:56 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb846000000dc", 0xa}], 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f00000001c0)={0x2, 0x0, [0x8, 0x2, 0xffffffffffffa296, 0xede, 0xb7, 0x1, 0x20, 0x9c2]}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000180)=0xffff) open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x0) [ 458.967439] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3a503b6d4 [ 458.967449] R13: 00000000004bdafd R14: 00000000004cd408 R15: 0000000000000004 [ 459.103534] BFS-fs: bfs_fill_super(): loop1 is unclean, continuing [ 459.334801] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.341701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.350229] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.356876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.363864] device bridge0 entered promiscuous mode 09:11:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8980, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = fcntl$dupfd(r0, 0x486, r0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0x6, 0x104000}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x28, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000400)={0x1, 0x6, 0x4, 0x8}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000240)={'bond_slave_0\x00\x0e\x00'}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\x00\x00\x02', {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'veth1_to\xc4[\xb5\x88m\x00\x00\x01', {0x2, 0x0, @multicast2}}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x1, 0x12) getsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x1, 0x1, 0x6}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000480)={r6, 0x1}, 0x8) pkey_alloc(0x0, 0xffffffff) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/10) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f00000004c0)={0xa, 0x4e22}, 0x49) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000040)={'bcsf0\x00', 0x4}) listen(r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r9, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e25}, 0x1c) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x1000) r10 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs\x00') preadv(r10, &(0x7f0000000480), 0x10000000000001ed, 0x0) 09:11:56 executing program 5 (fault-call:1 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 459.480549] FAULT_INJECTION: forcing a failure. [ 459.480549] name failslab, interval 1, probability 0, space 0, times 0 [ 459.544181] CPU: 1 PID: 16829 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #160 [ 459.551597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.560964] Call Trace: [ 459.563577] dump_stack+0x244/0x39d [ 459.567239] ? dump_stack_print_info.cold.1+0x20/0x20 [ 459.572451] ? debug_smp_processor_id+0x1c/0x20 [ 459.577167] ? perf_trace_lock+0x14d/0x7a0 [ 459.581424] should_fail.cold.4+0xa/0x17 [ 459.585506] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 459.590634] ? save_stack+0x43/0xd0 09:11:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x22d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 459.594281] ? zap_class+0x640/0x640 [ 459.598007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.603401] ? find_held_lock+0x36/0x1c0 [ 459.607506] ? perf_trace_sched_process_exec+0x860/0x860 [ 459.612972] ? usercopy_warn+0x110/0x110 [ 459.617061] __should_failslab+0x124/0x180 [ 459.621316] should_failslab+0x9/0x14 [ 459.625134] __kmalloc+0x2e0/0x760 [ 459.628695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 459.634253] ? _copy_from_user+0xdf/0x150 [ 459.638417] ? map_update_elem+0x347/0xf60 [ 459.642674] map_update_elem+0x347/0xf60 [ 459.646774] __x64_sys_bpf+0x32d/0x520 [ 459.650675] ? bpf_prog_get+0x20/0x20 [ 459.654517] do_syscall_64+0x1b9/0x820 [ 459.658416] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 459.663798] ? syscall_return_slowpath+0x5e0/0x5e0 [ 459.668762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.673645] ? trace_hardirqs_on_caller+0x310/0x310 [ 459.678692] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 459.683729] ? prepare_exit_to_usermode+0x291/0x3b0 [ 459.688769] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.693635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.698843] RIP: 0033:0x457669 [ 459.702048] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.720964] RSP: 002b:00007fd3a503ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 459.728683] RAX: ffffffffffffffda RBX: 00007fd3a503ac90 RCX: 0000000000457669 [ 459.735960] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000002 09:11:56 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='loginuid\x00') ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000440)={0x2, 0x1, 0x3ff, 0x0, 0x140930ea}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x10002) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfffffffffffffffd, 0x20000) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000180)={0x6, 0x1a, 0x14, 0xe, 0x2, 0x5, 0x0, 0x14}) open_by_handle_at(r1, &(0x7f0000000100)={0x2e, 0x9, "bc5822068aa1110dda96881a2878d77e1df7a9193f85945fefb1e83532bf456f2f39f63930e9"}, 0x101102) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x20) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x1d, r3}, 0x10, &(0x7f0000000380)={&(0x7f0000000340)=@can={{0x4, 0x0, 0x8, 0x1000}, 0x5, 0x3, 0x0, 0x0, "4dec33d5eff5e519"}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) [ 459.743237] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 459.750519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3a503b6d4 [ 459.757795] R13: 00000000004bdafd R14: 00000000004cd408 R15: 0000000000000004 [ 459.765530] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.772121] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xdf3000000000000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r2, 0x39}, &(0x7f0000000200)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) write$P9_RREAD(r1, &(0x7f0000000240)={0x6f, 0x75, 0x2, {0x64, "79dc8bd419c779bd019c07129995af4e66de75b7e004fade58e5ba003087e11b319fb8eecbeab9e7e6b43bba48955685ff3d3dcc175dd15b873f7bd30f4228badb5d67429f11f35ef96501ab8386d6a321a0be959904d70441230ecf5db401a4e8dd140e"}}, 0x6f) [ 459.853715] device bridge0 left promiscuous mode 09:11:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000000), 0x0}, 0xffffffffffffffde) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) 09:11:57 executing program 5 (fault-call:1 fault-nth:2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 460.306697] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.313198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.320021] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.326413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.333301] device bridge0 entered promiscuous mode 09:11:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2006c0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x0, 0x2}, 'port0\x00', 0x1, 0x100000, 0x2, 0x1, 0x196, 0x1ff, 0x1, 0x0, 0x7, 0xfff}) 09:11:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x894c, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000000)=0x3f, 0xfff, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) ftruncate(r0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000200)="8c9e69261fa23c6540ee8e7c8d062d15e9954909e8bce66957c1e91f5e13fe38aa5abc162609ec32385ae384d583b9729476deac62c2194c6a0c1a46b3d7434ab4c7dda5ac5fb64f411fb98ae8d79d863ac9055dd6176fa595a130db05b325db0d2383577b9dbecafc34602d014943b874c7007347f396d2b3baa4f6d8e0cfcc689fb6ed9f6f0533ee74e768ffdc648e7d989b9e15bffa6db4bc7d39964cc43c7c4135", 0x0, 0xfffffffffffffffd}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 460.581210] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.587761] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:57 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x20100, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0xfffffffffffeffff, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000440), 0x0}, 0x20) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000200)=@nfc_llcp, &(0x7f0000000000)=0x80, 0x800) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4001000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x202, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4090}, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x1d, "a46c857f53a2cd68efc9324e338b7c652a8671188ef0c7746b687a4e92"}, &(0x7f00000003c0)=0x25) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000440)={r4, 0x1, 0xff}, 0x8) 09:11:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x280000, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000100)) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0xf, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 460.629230] device bridge0 left promiscuous mode 09:11:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8970, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001440)={r0, &(0x7f0000000440)="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", &(0x7f0000000340)=""/141}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80010000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r2, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x20040015) 09:11:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x0, r2, 0x1c, 0x1, @ib={0x1b, 0x10000, 0x4ab, {"aaeefae2713ada105923a22c9d16d1a8"}, 0x4, 0x7, 0xfa}}}, 0xa0) 09:11:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='maps\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f4, 0x0, 0x0, 0x0, 0x6}, [@alu={0x4, 0xfffffffffffff000, 0x8, 0x7, 0xa, 0xffffffffffffffff, 0xc}, @generic={0x2, 0x1, 0x7, 0x2, 0xfffffffffffffeff}]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x77, &(0x7f0000000200)=""/119, 0x41000, 0x1, [], 0x0, 0xf}, 0x48) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000340)={0x2001}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r2, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000040), 0x0}, 0x20) 09:11:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000200)=0x6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x12, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 461.357263] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.363796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.370602] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.376959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.383865] device bridge0 entered promiscuous mode [ 461.390738] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.397249] bridge0: port 1(bridge_slave_0) entered disabled state 09:11:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 461.404387] device bridge0 left promiscuous mode 09:11:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000380)="2f7ba41b1dbfa7bc9e6e43a6b91eba01293acf8962a43ffb52dd5255570ee03a08ae856bb9c879fb0e1da865a0bd54247b511463a28981bd8a70a96517c4e1", 0x0}, 0xfffffffffffffdea) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x20000, 0x0) r2 = getpgid(0xffffffffffffffff) write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0x12) 09:11:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x7, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000440)="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", 0x0}, 0xfc42) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 461.669534] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.675993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.682724] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.689123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.695881] device bridge0 entered promiscuous mode [ 461.705674] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.712522] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.734614] device bridge0 left promiscuous mode [ 462.396083] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.402620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.409422] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.415784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.422918] device bridge0 entered promiscuous mode [ 462.440047] bridge0: port 2(bridge_slave_1) entered disabled state 09:11:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8948, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:11:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000100)=0x40, 0x4) 09:11:59 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x6, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:11:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="ec1c4fb51554b49670b0452ba481b0324067d0efccb3bf0e6fd74e7607f078e367b294666f3992395c589cce8e7315af1d5482af5027939f9f22b5eaaf986e68b599484d9a5f1ff8d17382c86caf38ac152727a24b8bc8c1571f6f2ea50dae47896b8c66d72a2855c762163ba494a9ec40f740afd7fd5ce731a9119957", 0x0}, 0x20) 09:11:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x0, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 462.446581] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.453282] device bridge0 left promiscuous mode 09:11:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4, 0x501202) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000100)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0xfffffe6d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:11:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0, 0x1}, 0x1eb) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x20000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x2, 0x4}, 'port1\x00', 0x2, 0x20000, 0x7f, 0xffffffffffffffff, 0x5, 0x7, 0x0, 0x0, 0x2, 0x80000000}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:11:59 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0xb, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 462.659103] QAT: Invalid ioctl [ 462.688186] QAT: Invalid ioctl 09:12:00 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000000b42d87402e5286dd6006f52600303a00fe8000000000000000000000000000ffff0200000000000000000000000000018300907800000000600a07ec00000000fe80"], 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000280)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x20}, 0xc) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/33, 0x57}], 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) mq_open(&(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x1, 0x100, &(0x7f0000000100)={0x0, 0x9, 0x100, 0xffffffffffffffff, 0x8000, 0x2, 0x100, 0xa}) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x9, 0x5, 0x3, 0x4}}) 09:12:00 executing program 0: timer_create(0x3, &(0x7f0000000040)={0x0, 0x13, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x1, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'ifb0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@mcast1, @local, @empty, 0x80000000, 0x0, 0x0, 0x500, 0x400, 0x40000001, r2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4400, 0x4) connect$tipc(r1, &(0x7f0000000100)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x2}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 462.968206] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.974759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.981592] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.987985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.994773] device bridge0 entered promiscuous mode [ 463.002202] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.008766] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.043617] device bridge0 left promiscuous mode 09:12:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a0, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = syz_open_dev$admmidi(&(0x7f0000000640)='/dev/admmidi#\x00', 0xff, 0x101200) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000680)={0x7b, 0x0, [0x2, 0x9, 0x9, 0x101]}) r2 = memfd_create(&(0x7f0000000080)='.[#\x00', 0x2) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffc, 0xdb, 0x9, @scatter={0x3, 0x0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/136, 0x88}, {&(0x7f00000000c0)=""/114, 0x72}, {&(0x7f00000002c0)=""/90, 0x5a}]}, &(0x7f0000000440)="aa0a050d8c2f34e9f95cbd773b61823d880d9b6064f882ce73b3ec12d4002c04cb1f014ae89b175b5baf8d4516270dea7e7692fe6fe2d03cdd926daa36c04fbd9541ffb6c2d9efaece9ef544089b249e4fcdf38fae9adb9309b573a0d6a5009741ad7d2ea207e33c34d161acdf4b221e3569ac5b4e7263abb553e64945256018c475a36f6eb9986465fd3c3bda6e8a9be0a2bdb66249a4c14f06adfcc24c704a81c2a6848281e7781d3f7d136ebe29d3135eaf80b49e33a5474ea431565447d446d5ed85d5b672fe2a69ab5b8e7f58d3e06491e43498a237a28510", &(0x7f0000000540)=""/198, 0x2, 0x20, 0x1, &(0x7f0000000340)}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0xfffffebb) readahead(r1, 0x3, 0x9) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101400, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xd) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x11, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 463.375447] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.381971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.388738] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.395111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.402705] device bridge0 entered promiscuous mode 09:12:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x6, 0x20000000002}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x8ba) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000d00)="b946242d4284e4e227b739de8cc8f26d5fddfdefd0b25f5c8d9eea8b8642688da780024dfef5ef811bd5459d1abe2f2c9d0f8a4ab0ea2166b92a77158b5c6afbe304733f718299a7440243ac9dd77fc599a08595d214830e209767a0f978c6f22bafb9a2e00ca228f9e056f8efead0492a3e8631e9369f03dc4bf1ac4fcf2bc68577bfeef6b8c2e7cfe597cc2de62f1d179046e4aeb561b71b41a86c3766b23ac4820757e54d1092fcc9a2a408fa0d7b5cdc383c217132653e1d767041864fdf174f46ec4d5824067a9410f39dc63e1256f9cfd760", 0x0}, 0x144) 09:12:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000200)={[{0x7, 0xfffffffffffffe01, 0x0, 0x8, 0x5, 0x1, 0x1, 0x8000, 0x100, 0x8, 0x3, 0x3, 0x10001}, {0x81, 0x3, 0x3e8e, 0x8, 0x8, 0x20, 0x400, 0x100000001, 0x101, 0x7f, 0x100, 0x8, 0x100}, {0x7, 0x800, 0x3, 0x1, 0x6, 0x4, 0xf393, 0x80000001, 0x100000000, 0x5, 0x1, 0x9, 0x8}], 0x6}) [ 463.577696] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.584302] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.672154] device bridge0 left promiscuous mode 09:12:01 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4400, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000040)={0xfffffff, 0x0, 0x0, [0x346], 0x0}) 09:12:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x14, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x40, 0x0) ioctl$sock_proto_private(r1, 0x89ea, &(0x7f0000000540)="baeb74073f2b2288fd98768f860a5e852fc35dedd51d9bd5d88d4ed642137afd1809b3482509239186165e13fc56317f1e577c782d6352e47b98961c24d063ce6c688f08f9ecb3f7c629adaac7eeffe90c83ed016afe5007b421968d92ad122096cc7bbc94bccf2202cd9686485751c58b7b61851424c2c50ae0f1487c44659031097a3ca20e0174b62015e521a85373ef574786c22603afd54f4af0e2082ba5810d2d68c8f62f0678758a22febc4b2a75de7766099fe4bb5c8fc966fdc258703815c3679c2f75b737424a482c22120f07bf6fe47e6b5314540da9bceef5998fede822dc7f323e5739ddff97b2e748de3935ad") r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="68000004", @ANYRES16=r3, @ANYBLOB="010426bd7000ffdbdf250100000000000000004c0018000000056962000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x240000d0}, 0x24040010) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000100)=0x19) r4 = getuid() ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000500)=0x3) mount$9p_rdma(&(0x7f0000000300)='127.0.0.1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x200000, &(0x7f0000000440)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq'}}, {@sq={'sq', 0x3d, 0x9}}], [{@fowner_lt={'fowner<', r4}}, {@obj_role={'obj_role', 0x3d, 'wlan1[%em1\xd8cpuset'}}, {@smackfsfloor={'smackfsfloor'}}, {@dont_measure='dont_measure'}]}}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) syslog(0x9, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x38, r2, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x44885}, 0x84) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x188) write$vnet(r1, &(0x7f0000000680)={0x1, {&(0x7f00000005c0)=""/156, 0x9c, &(0x7f0000000440)=""/57, 0x10003, 0x2000000004}}, 0x24c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000500)={0x7fff, 0x7, 0x0, 0x5c0, 0x1000}) fcntl$setstatus(r1, 0x4, 0x800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000100)="6548f3", &(0x7f0000000200)=""/152}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 464.158278] bridge0: port 2(bridge_slave_1) entered blocking state [ 464.164906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 464.171654] bridge0: port 1(bridge_slave_0) entered blocking state [ 464.178045] bridge0: port 1(bridge_slave_0) entered forwarding state 09:12:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x8, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x914, 0x10001, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0)="ebd0742ba45ec0e0cf6b3c2fa34bf0a6b995e091684aa2fe318e8b88d445faa9ceba58a2d10cbe6d6e58f87fe816a1ee97b08cbbffea35913ec186fe663e84f14d708168d1", 0x0, 0x3}, 0xfffffffffffffe45) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000180)='@', 0x0}, 0x20) 09:12:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0xfffffffffffffffd, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'ip6_vti0\x00', {0x2, 0x4e22, @rand_addr=0x1000}}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x5) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0105512, &(0x7f0000000000)={0x0, 0xfffffffffffff0a9}) [ 464.204035] device bridge0 entered promiscuous mode 09:12:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = dup(r0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r1, 0xf, 0x3}, 0x14) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) msync(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x3) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000100)=0x400000000000, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:01 executing program 1: getgroups(0x2, &(0x7f0000000380)=[0xee00, 0xffffffffffffffff]) setregid(r0, 0x0) prctl$PR_MCE_KILL_GET(0x22) 09:12:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) r1 = memfd_create(&(0x7f0000000100)='-\'{&system#+em0\x00', 0x1) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x20000202, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8920, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:01 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x202, 0x1) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x7fffffff, 0xcd, 0x3c, 0x0, 0x10000, 0xffffffffffff0001}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) syz_emit_ethernet(0x7, &(0x7f0000000500)=ANY=[@ANYRESHEX=r1, @ANYRESHEX=r1, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="0a516a473bcc6c58de83cfbbaac48c022684ae43b9f20b89418054907b24d597ac7bd177be0370245a00740613", @ANYRESHEX=0x0, @ANYPTR, @ANYRESHEX=r1, @ANYBLOB="913b25e36571753890919aa02c64e2e7f18f03c1644f97d33185c144e93b34f9e0a586092abb5c86f0f9c68b95571d434b5c3c4019b5b70421adb1483d713e6d1fc730057ba800f85d897c016c5d66fc017072cc4c5d9983108299b17961c3952db4ce9f3bf7f755"], @ANYRESOCT=r1, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR, @ANYRESOCT=r1, @ANYRES32=r1, @ANYBLOB="9ac85d9c229c81e9dd2ee4399512ca2b0d10abc0fdc3cef9cb8047c72f5e87fee4c472a75a93945cf019a7248cdd776fb2c0d5e06d92807ea9657ca26b186be905c4b65ace9326706aaa2a0d5dda33f40cbe481704dead4f16", @ANYPTR64, @ANYRESDEC=r1, @ANYPTR64, @ANYPTR, @ANYBLOB="1adcdf63b715477c05cbb1b69c37a5c409ca46173cb52866bfa31186860859bfe2c36f506046e0fe55d26fdffee294408fe41baa5c700c", @ANYRESHEX=r1], @ANYRESOCT], @ANYRES64=r1, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES64=r1, @ANYRESDEC=r1, @ANYRESHEX=r1, @ANYRES16=r1, @ANYBLOB="a31bfc87f389744f142ff058c43e73bccadd5f895b4bd4b494ee83595ed6cf4692a5e3fcffe5b0ad8952af86cb9ae5cc1be708e34b51594a6db15744f85653d22c843ceafd20fa8e0ceb4d49c2db94f3594eaf2635997bf010ef2e117f8bf2c739529b8844886ec459dc25eba0fc6bbdf96ba7a80a8c847977cb28fee50ad60002f58e0dc6e03d5e4e89693ca9bcedddd09a484a6638cfffb2b28d8ae45e7027c1ede932", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES32]], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYRES32=r1, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES16=0x0, @ANYPTR64, @ANYRESDEC=r1, @ANYRES16, @ANYRES32=r1, @ANYRES16]], @ANYRES16=0x0], 0x0) socket$nl_crypto(0x10, 0x3, 0x15) 09:12:01 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000000), 0x0}, 0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x7a}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r2, 0x101, 0xffffffff, 0xfffffffffffffeff, 0x23, 0xfffffffffffffffa}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000440), 0x0}, 0x20) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000280)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 09:12:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0xc, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000200)="859629056c7969d9be288a819310c5adf9973e322dba21f99bc6e372d3a1fd59ca45eeff36a4e0f1ef1e3edcf75c89fdb60bc648ddffe1f3de816c142e4b29ef84dcee817e10b5454a42d4ecff45974b62f1061145a092ff3cc2f138f810fe3d69cdd815fe7f78743c6e9e75f8bd4ea3743a14d266e8d04cae6f6b3ebaac54c696979a79c4d6fe0873a20216f5d7", &(0x7f00000000c0)="fd83ab21c5cce4849602e2df228d1c3da9ba26527c0829f6e443cb3bdf9e8623c97d8c474a483a789726c33fc3c38ccc37f97f2bb7d567459f676529a7c3b7d37166e0"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 464.539119] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.545730] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:01 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xc000000100079) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID(r1, 0xc00c5512, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000000)=0x3, 0x4) [ 464.640943] device bridge0 left promiscuous mode 09:12:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0xd, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000200)=""/127, &(0x7f0000000000)=0x7f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:02 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x280, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/79) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000140)={0x0, @bt={0x1000, 0x1, 0x1, 0x3, 0xede, 0x1, 0x9, 0x1, 0x6d9, 0x33f, 0xffffffffffffff84, 0x4, 0x1, 0xffffffffffffff00, 0x3, 0x1}}) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='notify_on_release\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0xf9f4) 09:12:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x13, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x16) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x404400, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000500)={{0x200, 0x8}, 'port1\x00', 0x44, 0x2, 0x8, 0x8, 0x7f, 0x0, 0x1, 0x0, 0x7, 0x8}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r2}, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000200)="e7892210c24d9e1dd410db9c972c6043ba782134602c1b65fcb64300fb6db9129b8fafdbc23a6416972f7bcb7a9ea7bc1f38c9ab33c855510244d17eb1ea5fb6ffafce33962c8e29ab131578423d94a3abd8acb066c05276a34b055f1c9726a08cb42c17aa43d360eb40efc7784aa661e88b56e18ba099bb7bc39ebd82319ed0bdcdeea865bfd0540a2e863ee36eeca9e6e9c99e6cafe28cc5d53486829cb8b15406618c44f209424e527e976694998ba467d82337be7ee78eff16b663c3a20803a4a2d0f2a89bec19d964391ed1", &(0x7f0000000300)="aec02506e798c62690aad9c492c80dcb65a7679ce09f200730137f76def8356991944290c7ca9a51d19c643a50ee36dbe492480b3dc55364ccd3addce21c92b762f76f9e5f5639d773a46c592c777e1a1588a048164a6c2576b418874c8b570839df160ec055af3a52c62c59ff35d1c28cb23284f2f0dfd39655962caa829ee92c69ef2c32f3719c7eb512d10d8282a2e17c8ca156de91539ba78f5dd2a2ece86ab30e0b88c43f74198b19b6fc2795e3679c0c27d6e36ea77a093508e422a4e1036e80a7a281c18d033e847b4c3cc4bee4694212a91d8002be928229", 0x3}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', r3}) 09:12:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8927, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 465.026196] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.032702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.039534] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.045893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.053648] device bridge0 entered promiscuous mode 09:12:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0xa, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r1, 0x4833) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x2c2a, 0x80000) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000200)={0x401, 0x0, 0x6, 'queue0\x00', 0x1f}) close(r0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000000180), 0x0, &(0x7f0000000080), &(0x7f0000000180)) keyctl$set_reqkey_keyring(0xe, 0x800007) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) clone(0x4001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r6 = getpid() write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000100)={0x20}, 0x20) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f00000001c0)=0x120000, 0x4) sched_setscheduler(r6, 0x5, &(0x7f0000000040)) ioctl$EVIOCGSND(r5, 0x80104592, 0xffffffffffffffff) fsync(r4) socket$bt_hidp(0x1f, 0x3, 0x6) r7 = socket$pptp(0x18, 0x1, 0x2) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) dup2(r8, r7) io_setup(0x3f, &(0x7f00000000c0)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x100000001, 0x40201) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x8000, 0x0) io_submit(r9, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0}]) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000100)=0x4) 09:12:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000200)=@hci, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000100)=""/27, 0x1b}, 0x22) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40, 0x0) r2 = fcntl$getown(r0, 0x9) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x2, 0x8b82, 0x8, 0x8, r2}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8904, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 465.277664] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.284249] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x9, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 465.397432] device bridge0 left promiscuous mode 09:12:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x2, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 465.797224] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.803723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.810508] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.816923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.825210] device bridge0 entered promiscuous mode 09:12:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a3, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x7fe, 0x4) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000140)=0x8, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) recvmmsg(r1, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12001, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0, 0x3}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0xfffffffffffffffd}, 0x11) 09:12:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0xe, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:03 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(0x0, 0x8001, 0x400000) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000002, 0x0, r2, 0x0, [0x14]}, 0x21) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000180)={[], 0x4, 0x0, 0x0, 0x1, 0x47}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mlockall(0x1) ptrace$setregs(0xb, r1, 0x2, 0x0) 09:12:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x10, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)="fd", 0x0}, 0x3e44) 09:12:03 executing program 1: prctl$PR_GET_FP_MODE(0x2e) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, 0x8) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x2000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000100)={0x6, 0x2, 0x0, 0x2, 0x3}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) 09:12:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8940, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x4, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="63766b8634dd25ec18bef932aab3f7492fe0403aface06dea99ce9784916bfa68ef442ccd131ee4b88fb5b877ce90777fe4e0184224978b6e17f9998cc897d1a6e3b511e55537d981605660e9584421e638393854e3db7558ac4092709585bacecb06c8114872aaa24126e4f", 0x0}, 0x20) r1 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0xffffffff, 0x80) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000380)=[0x5, 0xe2c4]) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) mq_timedreceive(r2, &(0x7f0000000280)=""/70, 0x46, 0x8, &(0x7f0000000300)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 466.139281] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.146380] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x5, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 466.183496] sctp: [Deprecated]: syz-executor1 (pid 17246) Use of struct sctp_assoc_value in delayed_ack socket option. [ 466.183496] Use struct sctp_sack_info instead [ 466.204597] device bridge0 left promiscuous mode [ 466.249979] sctp: [Deprecated]: syz-executor1 (pid 17246) Use of struct sctp_assoc_value in delayed_ack socket option. [ 466.249979] Use struct sctp_sack_info instead [ 466.309726] sctp: [Deprecated]: syz-executor1 (pid 17252) Use of struct sctp_assoc_value in delayed_ack socket option. [ 466.309726] Use struct sctp_sack_info instead 09:12:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff070000000000"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x4040) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) 09:12:04 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x9d75) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000200)="7437acb72b39ca77d31f68fbbd2d634240721838f614f5c0ef9e3605c42f5c74225763f955bfb55dd84a7294db794138404ee6257f009a79a1ab0a6a9e4b240280216a0937dcd9d5eabf9560efeba9280f64eec22ca87743258f388afff5ae9aeb4e7bb28db384f1c0b4cbbb5accf845df88166e8492727ef186f6f50809efcf7ecd04439b3526d864d1", 0x0, 0x200}, 0x18f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) socketpair(0x7, 0x2, 0xde67, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100), 0x0) 09:12:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x4, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200)="63766b8634dd25ec18bef932aab3f7492fe0403aface06dea99ce9784916bfa68ef442ccd131ee4b88fb5b877ce90777fe4e0184224978b6e17f9998cc897d1a6e3b511e55537d981605660e9584421e638393854e3db7558ac4092709585bacecb06c8114872aaa24126e4f", 0x0}, 0x20) r1 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0xffffffff, 0x80) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000380)=[0x5, 0xe2c4]) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) mq_timedreceive(r2, &(0x7f0000000280)=""/70, 0x46, 0x8, &(0x7f0000000300)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 466.935216] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.941698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.948395] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.954805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.962340] device bridge0 entered promiscuous mode 09:12:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000002, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x200}, &(0x7f0000000200)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 467.159217] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.165887] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:04 executing program 1: socket$netlink(0x10, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000)=0x1a6, 0x80800) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffa000/0x3000)=nil) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') recvfrom$inet(r2, &(0x7f0000000340)=""/81, 0x51, 0x10000, &(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10) sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f0000007000)=ANY=[@ANYBLOB="f0000000907800"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000000c0)={0x1, [0x7ff]}, 0x6) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000140)={0x0, 0x1, 0xfffffffffffffff9, 0x0, &(0x7f0000000080)=[{}]}) 09:12:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x541b, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 467.345012] device bridge0 left promiscuous mode 09:12:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff070000000000"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80000001, 0x200) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) flock(r0, 0xa) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8921, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 467.673989] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.680426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.687135] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.693612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.700493] device bridge0 entered promiscuous mode 09:12:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) dup(r0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000040)=0x1ff) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'veth0_to_bridge\x00', 0x3}, 0x147) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0, 0x3}, 0x20) 09:12:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) lseek(r0, 0x0, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000340)="a2150c8f866b6a2a7c9b27c8839c6ecd1e1d19b4735aee0707ed2e092cd94b39488c6438a889c3ce004c4dfdc0b2fb9ec71476c14f3802af8071ef647a2af825383c12f50990ae5e00fa7025ab0b5dcb2a3c91b6705eac997373e2f44630545f40d5746fb2e8133a349c4b97e110982b1ea5a71cade1e9eb4630a5f96c65c17aa9fb666e07ef6c7f8e476674cb9620c905a246143164d25f1207db63cb34d10826", 0x0}, 0x20) 09:12:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8947, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 467.930568] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.937142] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.950561] device bridge0 left promiscuous mode 09:12:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x2b9) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:05 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000013000)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0x40505412, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r4 = dup3(r1, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0xd, "dee0e03bdba15faa649b3a04e3"}, &(0x7f00000000c0)=0x15) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000100)={0x6, 0x20c, 0x1, 0xed9, r5}, &(0x7f0000000180)=0x10) dup3(r1, r0, 0x0) [ 468.457017] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.463546] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.470319] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.476692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.483850] device bridge0 entered promiscuous mode [ 468.489534] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 09:12:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff070000000000"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000440)='(vboxnet1em1-\x00'}, 0x30) rt_sigqueueinfo(r1, 0x35, &(0x7f00000004c0)={0x80000017, 0x4, 0x1}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000007300)="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", 0x0, 0x2}, 0x5) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r3 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x77c, 0x420000) r4 = geteuid() r5 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007080)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000007180)=0xe8) lstat(0xfffffffffffffffe, &(0x7f00000071c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r3, &(0x7f00000072c0)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)=[{&(0x7f0000000580)={0x14fc, 0x32, 0x8, 0x70bd26, 0x25dfdbfe, "", [@nested={0x284, 0xb, [@generic="1de82a87b3f34e8fa42c232b1ec364d64ad6cced7f12b7945d1855a651887b479cf2ddaa7641f73755bfac17cd411a2a1954778cacaec9a8166435d6f3a92a640642e24d7b2fb72be67ea20bccac8a72133f76e5a2abd2199c9f56df02882c61ea5ff196fbd834c4f3cfe3ee59dbfa0972244098e00ec0e93575f14849a712f72659c6aa9f0b703e5761605493d3ea7bb3b2604b7647488d1a5cd0a3a8be1c9823a7e2c5922aa36e079445a3ab619dc3edd054afe69cdf16b1e0bb2ce6c84a963a2632261229328b7aa531f2ee18c1c44a794929aa6d19ad85c276c6fe30865d3adbb415ac069a1e7ea8a3", @typed={0x30, 0x1f, @binary="fed590d5e289585d0a5a593539d47ce910d7d2a2e62e731e485d1a85f8e8825b6046fdcb12f8035c54cdef"}, @generic="ad03edbe0d16d35a380a4b04df38368f90c729c37ff0327d77161279259eda2f9e73d9c0817382037a4ce89669bc998914c953a0b29d6bff7d4b55e135954c0c80988bc1a97d6a7855deeeea35955e18c27c0b5dcf6788bdec133ee9d3b349ba6c764336202269cdb441ef18f92af9fc5de90074e49ec679901c93d1cf4f68d77bb18411994b52f4a6de47b8b17cc32c27df25d129db09c6dfab11d43910bb82e4d692389ccd2c507e497aa1d72dee40a6f34b3544260bafc53e89a0fcabda026f6252f41d4b9ecee44bebd117cbaf2cadf5f08ece9f8848961de8ac90e95129902c0b3030504d0e72106fa5e989579bebca", @typed={0x8, 0x2a, @uid=r4}, @generic="80e69decb179e13262ecf5118f677cd7c41b3e3c29b9f40e5dc61cd8e3f5e613782104321eacbcc3d0b05148528722db9d0140216669d0c0f16f8dd7a46d7fc3debb2e6354952bad23155fc415f6a3174fcef2f39d7ae1c8df0b9f0ffad1cb0ae634c9d8172c9261"]}, @typed={0x8, 0x66, @uid=r5}, @generic="a528b489cf7e16ef6a72040330d248b5f214a9944d2467794edb2008c8a6a947779c61ebd3f4b51735e4c1e81e3614d1f0c943ce0b0829e417d363756fd46782cdf9b0e44bad96", @nested={0x1204, 0x20, [@generic="4afd7cafc5c0f35dea7c6f92b4dd5ddacf1cfd85d3724ae9e6590ab90040cfee09a7ddebec5d371558094b95d7109c81ce7744b3c4f617bea1ddf71077990d33f503670b542f7e172449ec5596470ef3902f0d101ff065fc60d3035511f44ee248d7b986bcf6027a623d7805f1fda42d3b59295ac5c2cb755f69c38455b8d9f2e837ea6b4bd6d6bf8bb821847dff15c262b1d303b9eaaa07fd3ea25a19fe6f9c6739bd51bc3d64abe0ea9052313b8efe6c5dd50e1beefa905ee1aeb1ee95d0baf20829821c81efe8bd59e4656895c173ac3455f7a2d2f1a3b90ff3fd3c07603a186c48a25b3dd521f7ffd2f1e95e8b5d4087042b2b93b2cb15538e69fe617e2ae3b1582f4b5c124afb2c13c18b691f9dd3cf0e16fa17b59a3b3134200e770a84b9f5ee2660dc392a95f72e44c9bbc2b4c49cdf7ab918aeb65ed3aa22c2c65042751aac88d9cfa5ddfc2a7ef4bc519b7d9548f78456f2fd63620f1b03204673bce881bddcafa739fb1a497f933e621edf0e5407e9d70905758ad1e2628f499990f848ec2c836ba1e422f69733e61b942fd5311553eb3174c271059a53e66af52652c92daac8d529e630b633b0b7e01b48805c20d1cade4296ca8ca65422e28dd751f480b0ab1c2e1bf7c8b16fa25e22a75e6088ec61d8b0533c528592887df48588a2d76c4671c4e44034f1bbdd48a77034ea3853899007ad392491335049570f72cd2f702241a5abe45d8589b0a48a32b3b3306e1fb6ce164d2bff5b767e7dc93120f3758f48f3d6a304d8de6885136b6f8de9a33d95c1fa12b32d4315ba850683d0a4095fd0ec112bcea712a490c00127c0c7422292af3f1eed667f3cde73e67a12f7bd454a50e7dfd2a1cfe07d2043d8e506914ffa91205525037fd30e502787ec3ff4470e1f5d7ed566ba732bca67073cfbb0239a2942c21a070ecdf34e89323c3c69826a49980c5d5a309af45d86555fda4d9b2dd28aba330b44a406c2641f39e3dcc7cc58a4d343929852c70fc8317a4e457276928d85ba4c07287c510bde49cbd3c337973b0c5dd702919e3f56365ca69157f178c223e28f0bba4de40ea9f23bf490ed3ce798ca77c36fdf48c36d47db4a5f1cd2048c920f741e805f7d3bdd364cf00e9f8c70329168f137f22afd8717954881ecade5960214e6c8bf2cd8b82f45e013b7b9f9e5a517a1a117c58d87fccf9c119b0264ba37a67423baa3b27ff0129e34dcab6c31aff2e95c7c46b58829f2d4fae48b1814f3af46ea02da38c60b676e882427188469cc3b96c315c36666f80df5c47e3129f82980c36e4081b3c5d580c877256d410ec3606970e4d129c1935c7fcdaba727617b760eb04507133c89f5d529edd439c74aa7c2e6d0b82723bae6cc41e376b6a521e1eb5707111da7d1b0145bb5841cee3323bdab263cf49cb70537fa0941a6b1bd6d87c4922064076e6781d8a878569347ebd695646bcac305d3d38406743e1f9aa5fcb799b7edf887678e37c9cd3e02b1d24127bddec3c99724a062dbdff5c41ae5e6bd7acdd5f45e060d652de1d752e05c8d38f416100bb8d6e7c0f0de8b18f660f9b18a92bcf81e1042bd805fe944e84aff566e57e2ee0fc96d4b2ad76c8d25716625ad67a9feb83bc8d08790f0f25b355a567167216949fc2f8237db46c77f87c19c46e5686fc5c9f907f04dd93b9dba41c4950148f6e76730089613d4c04ba2d34feaf7c9e606ddac66ad7e49f641f89652892b0ea58c8386f67f12d7b99b59f8ea6dbcf81b6ac9062ac0b8dd71184dac525f440dceca6bda571dcf8b2bbb267246dd62795e1e224ecf07669bd64cb2ca0d1af2fab1a39c3a0b92dc849b374ead3ab59e4ea68bd22b77574906d67161b5c5e81305336bfef91cbd841a462a2e244c0607a9968ccebcdc6e39b6f856b8253cf4d773674b507fcf881071e20c2d419ce2e651059ca612cf58bb554e88d6a8bc1ed16e06573ae3474a126f5d6268a97c914b8d2edf1e68f9bb5c68d47e5d639122347f3f463a2775b61e9204d823f5872e2a96674a5cb4e87c1c805d69219f8629cee1380cd765fb6caa857fb0c075e47715f15b951c44db74c7c2c7a9a71e1a057320bbbb00c1387ec171f93d2cfb708a4f36751315a7ad0e037ca4f5311c0daed423f028608e845ce9b107f2dcbcecd41209e24e92e3ffc45ede4f8b2496561807230cbb9ef0f9772ec8174d5b6310152e2e83a678c627e0cba3ce42fa347ef3ddc1098d58140eee0eef28b75cb8bcd706bbd7e48059aea0d9724d69e7d94a89fba3619bc3c9c51d14eb7465dd7db75d58dee2cfcc282747dfa3b8cde3c3a608acaa57d86f2a194497daeff4858d41740ccaf66de572ac1489152130a490675a541524537f8144d9b12183b9651bde5ef828de46539f55578d707261665be99d3f354f3d321ca4c6073476bd62d32919e6c6ff484e95e55b55ee6dc9af17e33c5904012502676eb3e055e83810cccc81af72d9f683d149c86fb4cc2e98826cd7acb97f714398de8954cbfc2cb6ce62f31644e8ba22677fd135254ec133a152ee1d09f14a7e9b7a13981f29f15f74814ee1ee2ae968049d78c0250910e4adec3b23d4ba072d6f453ab7853e273be4a23bebf92cd29382d4c7cc7f077664af1700e4d58543bed7777e2b042d73db2eb7ad0259c283e993d02cb9eb372730eb98a95809817f09d8ba04cc7adb077b1d79445653352a04e782624a6d4b50a94a76557a3f36f467012f302ecf3f4f54f0966e04eba2f30f5cef7e8fa9773bdea20fb5d160742ec5232865c86f7d9fa2033ed0ef45d1f5500175601c56bd4c661ff1fb88ec1e3a2c95dff8cab351d5732ca82fc988e31f8efc23cb1cb5d4469ca1ef0001eeb8131df988685b748cef231fb0966e1303db252c14fa09b2341dcb3cf730d44e50c01f1ed42a56b4d50f36181867df799e0d8e5a0f41d660c8d110797af46e9daa2baba0835fe9b962360b55373c7298e8d0aedb7d49b75c7a70444993775edc228c6118debe78d371e43250832a0ac7231826be9bd65c7a8f520a3247bed10e146073e30afff4d139928a4000c6d7dcb0fa4531b986a79bbdd53bf91156065fe08d3e12d590517325a70966227d105123b64e15a108a37c3827289e7a9112658666bdd57a0469040f55b896ff6794b42f4156ed6b0809813d6063480bea7a471e412069450c3a0c4a42daa793fec67e5a04acd8aa680dece4f665db87fd45eedc63a0d2d5d4ec9f6f39617affe829df350cb3735016d8cdd5f34b0dbcf0ccbe5135f8caf31c2f806f96f0f556def7d4979e55047a2a19c37e85261a54726ce19ea075fd0df097be99d99ddcfa296648932efcf569f213b5e8fab8782ce3f6f20a2b688d64d214b388303ea63caabb479644f4e0e914e3c795a585843fa134fb12a2b3a0d134f5856ceec68c8029adfbf87c65115bcb24fee11d3f777c249a92e3dd698b6c700be6c2f8bade34fc4f3232741013daa21059e98956216707529594e18dc694cd0dd0f01356df4c7cebd5e970f98d0234f0a12b3f41503f57711633381a11f13782e488b87edc8d623eaf712228a2cc907a855cf48d50fd0d3dfc73c106db09d9374d3b39e7fc498ce9e7e1ecbf9051657d64da4ddb7030d1489d0dfa2fdcd81985566d78f68addab359eb3a1376e2a0f72ecccd5b5e2f1dfca160ec33435fc45dd6a99f2b1cf491efb4f012c9d98c829a56b05357a8dddfb171f5bb127855dc466a0a50c19690f9bf7f9cd30587c886d8449d0536d36d711f90b07b563c80b40c8b9d6ccbd9eeb1f1bd208a0fdc2e2a894be567d684081efc65726a41de97145848735ec7277b4eebc836292b8e7d523cd855607424d5593d871bf948ceed15275823e1bdada4c71ce76adbba0299cf0479d22fa469d9e1d8b00355d53048df7052934b680421717342111796ad39799d240b9c4b28f3393c21f3daf35fe331d04a02d665aafcd0e5f61b2c2d7a8e4ac55707464d8618e5cf26f4e9ec13a95ba698cba93e4dbd7c58577de64e89ae4e29ac3b7d0c1027458f353dfd30a7d7b651bbd2fa67d49e0b75d251abb9cde9e0a31c261ffcd39cd8f0cd7b3a2ff726cb5c914a466b07a7606db4d2c0f24789b36923c93f119d65adb59482ec6fb4b98b7edf4dfc149c314cfe691aa5dbadef32404473efde611105800b9737d9e0ab379672d97f45a6269e8375a86239987db84fb6d81ee649f5baae0c7aeca1f1dbaead655b594ae7ef810da6fb6b4757603b5190b27c3a0197c806de118615c715d9276b38ce986c6c74b18847d9b6fafd0b1f6e647742efc66b2a917ff7b04d644a280953973a3e78c83c6f5934dc20fa04377ed298488c1b620a4f34340886c75f17d4584cb4324dd7a31dbe0472cc46e855c94ccfce4233349dbb9b0f876dad167c6237c35ad4e64b30764760776d60df6eb78b2bcf77b571eb3d1e72096a6b8d6576dfb48fc17c5b676eec4733250d7ea1aa46280d6e14bbfa4e9475bebfd91218cffb58a7bf7828f790de96635265b0ba4baca95a33aa2dee5f455df92b623d18f9e39f0cc30300ca701e61016663459e56c631282375e8107930bada8f64c4224a0799b58733b52a4aef70747a78a3e33a7a922cb8590f11ce2241a7d80b6cb6ef0d7e5628c389753768216233e1af250cd30f42907b68da33f289a84e0f455382bd2baebe2eb23350ca9b862daf91128d69c7bc1f87a64f58589203c946216c6b609045fd533859651aee369255cbc8fa040ca68e241697a6739334cb9bb74af904b4c3efc3a676aec321acc0d73a4a77fe72ec5e1e226d24514ab05a9f4129618df0c6bc589b67f6694bfc87b530d46ccd1d3a98a73b726c48c85adc70b4077d437465baea6d136834d30f6cfdf2ce443d0768df04f75e359e0f4e3b08b77c9d46048df84f1000400aff1bd31c15593f09d062a9abf3ce45ba3e682821cfe6d89d2138cf93e39ce33a23025442cde7fb8929271b24f949ad375f252e05f78321369f2e6df547682c63fdef870a5bb12adedbdf673e43951c6f32020d7b88120e8c28a5793efede72963c2226064efc2ba193759468dccebe4d7c9d51cc4d067de6b4af9b90954d3ac3aff963f497c21ee79a91edb56a066afb30a54c7b7d3701b89c790302e5aedf702a8e31c6bb25af6047948a5aee47e6a6837f010b0f339e0f38b155164a81b6593d6bba6ed6cffbf9d68ce22e52da9c2a71d2b3e6cd053ca9715f88705a592060cb94a1c4d67d543d11c6a8ef7828ae77bc40ac836a54f60797ec5f1a357d9596057cbf1a676ef7b9058c336a2a5d2eb204698760718c28f38991eef50362aa8ced6365a6d36a2d00aa8f5d8b8e222168f8e2db765b9dd34430e8af442c8a28439aa19adeb0432fda90d2d89be3a6bd7a5d2951c4134594c9ebaee267f8c3b37d60a8755309eed84fa45c2b615f781f3d70bb86ea389903b5671aa9599317ae2eb1e70605bf777100136d08aab2636f8c6b87f4c0bb86cf9d3db355673a916e8c5d6496eb908a1a10fb3ce47bdd19916928788d871a4dd2db1f05c34c9e4f02823cb11ea21d9cad65cb5838fb55a2ea585d06b1dbcb32209c4fc3d01a77c7f58a5104288fafc71939500f739f07f0ccc3a59730690fdf820900f18a4f5626fbd0248d27d6cde25378f3e5fa817769ced046600c0033c8fcf88fc1d4cec210c66aae9c1eb844ee59363e22491a677fab72e7b9e429be40bda1765579ba9ef667046855e0de34afcadabd0ffd969252283781c5ba424b5d8934588911f8ac2", @generic="63035671d524f753c854ad6363e7df1e598da3539d28bf97873e01f0e32b2423fd50e54c234223cec823f92a3304f0d53efed0d88e0ae103e71625002dec76d7bf2824081e6659b6c94e1990c4700a08e6ae02f0daf1632c6746be34a5fbfcd8b4e7edc8345ff6650b37e900b4c9c8f1f8e8d5ba89b73621566f8de4890669a41c0fb499dea19cb2e2d894a10e2b3263fad7fa5b6b17fb5a25302593de770f741e76dfb8ebf4fd99d8b5c78874ccd7f4f2588271a6bf19c2a48fc45133dc30c4c00ced2c03fc2c3756", @generic="95e4b384d6272ebcd7197ca85b692936397d07717898ecaa7028dcf681f34e1d34d6e134504d95b333ab762b71c1a330427e83da430e021b143068eb08be34c45cae5b6161da0b6f34645c9071b8a5e38d0cb5b554b3fad9f56e32688c60f7e412fabab251b4b59e2a57853258bc65c2ccb73d9aeeecead40a8b", @typed={0x8, 0x7e, @u32=0x1b}, @typed={0xc, 0x1b, @u64=0xfffffffffffffffa}, @generic="ef1d5bb6b698d20890238b77586fb56810a0d01a7b97b4e6625843cd3299b86df1e01ab31b82cd2124691b6d05d77478e8394c3db7f6f109ac699103fc0d27ae296deef72df40996fdf6e8839519a5eef50d7eab799defa206dd7a5b3c7d1bce4634451e7fd862002fddc9a14f0cc0297557c67ffaed89c4c75e222a2d6bae7da0945aa94305b860e47e28e9a291b8ec0e25e9b08cf1d82a07ceba73d86b3ab48b19d919cd3083e9"]}, @typed={0x14, 0x5b, @str='(vboxnet1em1-\x00'}]}, 0x14fc}, {&(0x7f0000001a80)={0x120, 0x39, 0x710, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x4, 0x1d}, @typed={0xc, 0x29, @u64=0x1}, @nested={0x100, 0x6a, [@generic="338f7cc99cf673e7f00d3fe2dabccf58766faeb97c3e7d8c0aca041f6b6cf2e53231d2d8139d9f8316e047a091598c49497139d35f8e3ec701c911adc1ffd7b7af596cf460398ef5e8a293f329ccbe7eebbe1ce28c7eb025df0d3374418ee88adc970313729e723dd418cf25e97c7e0fe476a742ecbea20209f8d4ab2c51849cc1b98e4228c6d4adc6283820527ad6d7c33714dda02b91a1d6ae5e7d64e6cb8289", @generic="f22edf444f6a0df5fdf543f6c830143bd71b0f830dd0403a85472e6c52093673d17022a8df39989ae5b6b2c94041bf07c1c607", @typed={0x8, 0x4d, @u32=0x101}, @typed={0x20, 0x90, @str=',\\em1{selinux%eth1B&md5sum\x00'}]}]}, 0x120}, {&(0x7f0000001cc0)={0x27a8, 0x36, 0x0, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x4, 0x2f}, @nested={0x1008, 0x53, [@typed={0x1004, 0x3c, @binary="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"}]}, @nested={0x1354, 0x2a, [@generic="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", @generic="16b1b607d5a7be076150c7400caf2426cc678ece13c6abef431233cf90bd0a377bcd57c07c3650589ec2fe56940b101dd45a3afa5785877f98483d197254e228b9207623d3a2c2c97d7900349d36c8978fd5abd7c2c5f17fde676c9192fb54a15f6be5515b7542b25e6c82eb65ce4d98dcb78df13721c6be565b92f784a3fb28761a3108db55145204587b9f1d2d81709a125e2f5421c7c4af53555c278132b22b9b9a7c9057ccd39ea73a0a3162dd92f71914", @typed={0x8, 0x21, @uid=r6}, @generic="5749a121f1018e454423bf0eeb1124108b644c811459cfe9bea265cc068aba9c017f2c9fdce844bc55fe79e72aec4f35c241416a12fb0b912a46c2ba68c9a3852db0fbd7aaad8bc4c6b44c6287c7ca6114f2fc2269052e2a5bf0d32e3df602e94220f70123d3b909c884b7822e45c38b250863d73a7ea6cc540fbb7e4b18a0a4bb438680469d77a456dea2690fd85f4f2131edbf876191aeca1c3f5afb44f7707094d96f87c80db9d56e598c9a7d30a815146157f16ecb7d4b303a678fe4", @typed={0x14, 0x4c, @ipv6=@dev={0xfe, 0x80, [], 0x21}}, @generic="e30f9eaa3c6ee5f3d7136c6ebaead4fe831a2e21ec534b22ffae4f4a360d1745f4a9504c6bc2328740f9a14ee0a178d65bfe43ba8d88282187b8f238faeb936014d0da1f130898dcf5263c805dbdc25531337e379dcd08ded31ae7a980ddb18dbd094312b6323c6939463f7157b904fedf2a857dbd97a134ecff3aeee0c3d71529120f11e48f5db56b8cce412a7e686309ed95ce726de81209f7c6bbad", @generic="8a6798518662edd3f6dd5ebb8390723bc5159203a7dc5fcf6f94fccea87962018ee29765b8b00503c93577672d63e7dcdd029a95603e872776d6c89bb7eca7e4310e4ac6644ee17e7660f5b82aff9a9ce1f03aabe4efa0126220af5a578b4e58c32d8b873050cb11ca7a3bf7262b1dda1cc1770a3bcf6a3a95377f52c0166016b1e286b10d522299bbdc66dc3c6e2fdd044a04e3", @typed={0xc, 0x3c, @u64=0x6}, @typed={0x8, 0x6a, @u32=0x10000}, @generic="3a8aca8f20c2d6fded158e28cfdbb941ce30e571cb33fb73bae7c37ff8d7fa0fc2e5a9f932306a9cfcc6e627234681459151b1f39e32f9452965f9062ba05556074e6ca07cb1dfcd8fcbea7762bc7f8c14d3b51993b262bc2cfb577173ac55a784dcd5fee22d937dc5d2dd4ec120242eee9e1937383881fc587439ac"]}, @typed={0xc, 0x8, @u64=0x5}, @generic="31c4f05111b5646cd8b2ded7e3a80705c8548ee80564acbb2480de336372d65f970600f3ab1f5d7bc053159a11ce9f61a52fdd0ef23420a3da8a185718dd627e5225d4580ec535d92ef0c255f0cf9e7aef40877babae34390c0ef150cf87ce7216822e742bcdbd93e9cb7eedb5a79eb05b0954a2dda00fdd7134a951ecf06ac36f609e622e61defc8f7cc1d1ec98a857f1c70c8df12f94c0156a098a00db6ccf4443bd424925a39a81100b15d321e56bded3096db2d969e5d72ce4d98a7acae04bb35eeee44492dcfc0e9c8fe4fc1df6995a4d94f3a7d0003d323f6db9b961b4856287", @nested={0x2ac, 0x36, [@typed={0x8, 0x49, @u32=0x100000001}, @typed={0x6c, 0x37, @binary="f359d22a56e38469f7dcb1a332d9631bad2a278580966b6e10a0564eb77cbcfb410a76a811506e288769633fe25fc31ab35a4a69cd779ca0b036c65de0e312bc6a970a08edff34f6e0fc13b3645c80859bfe75e5dd6a3a22dee940538e68f9210f29f1370e8cecb1"}, @typed={0x14, 0x64, @ipv6=@ipv4={[], [], @rand_addr=0x8001}}, @typed={0x8, 0x19, @ipv4=@empty}, @typed={0xc, 0x77, @u64=0x4}, @generic="9321e89e7a2e08fe192e26ac0cfa9d51d83867042671b287342470f9dbb66cd8cb02a2fc813c2a387ebf1743fb34363e7cf134af3fee10c8eee8b9736454b3fafcb11d0dccf8afdb297d7a647204fc", @generic="3139b139ae95256c8de6484ba8f0801368ead54d55836f0c8016294a6c6c43abcd74caec12a359", @generic="e5a4399fba22cefbcbb45c3eb8058e7caf5f8de4b27ceedce1bdf5fed29451bade6e9ef46de32dbce9a88e912d8178fb52ecdc46c242b149db1e92f2c9dd4a9d4c6a7085284d097bd912c004057612e4f273b053bcc1134127a63dcf3c94cca6dd33aad06a72ffc3110f0f1eee1deee409aec003db699be6db7b59169a4c54d44bf5d4edef78a48d870407a3043eced29dc74f10a583f086186a6f8f7ac5dd5be518088fa2a8bf36763cf3e1fb5ff22d8dc481ebc681aa41addc467eda5c6026216c", @typed={0x14, 0x12, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, @generic="c0bc681aad0e25876e053bee029d08f67d6cd76f923081c95bb40654354e56b3215ff121e5eafc00775145cd269754169f70913e7e889fe2b3d52e9e1eebf1650eaad3abac5f7dec92cc526c36509067207de1c0aa6df832f2ec763095359028874961500c906d7905221a30e1fd0628707e7beb463ef71e95c669acb601588bb5f2dd6891c00f1af931ea282f23e27ef4f54cf8900db154dbbb20d99a872d744ef27db138a23f54188e7a78094b1ca2d83af9ac09bf6b56fdc2ed236e"]}, @generic="b86bff84c469d013ad2c7adfa5cf7059befdf874e7ec84d74f171c8f59373f953765b082ede09a7b04d8b70dfa806be568a09f8e047b70f603c8a7bb71938140597fb8c7e1e3f6bd436595b487c5f56dbcdaeb8fc6b908c3d9473da3f2290ebb7eb19147686de7eda227b6a851b68a80eca01e0865e11f323ff3437a7d658565de8e584bb1e3dd52dcaf874caceae4a14038274d0f1e63799d80"]}, 0x27a8}, {&(0x7f0000004480)={0x6bc, 0x1d, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@generic="49cde8a4abe918cbc9b971ae2be331be4fe937a881b5b4c96ef86ce540209cfeacaed80510e1d87cc7899db36e7c5048489f4e96842fbb057b74f6ac8a8f1b9bdad02cc1e469af94a217444a552adbdb250ff79f47964a9fbde11268b6dd81676aee8d21cd75ae29fb92c41ac51f2fa7ba891b526a464fb325829e67f68f5a7ee04152f3d6fbc5fb02edf362507045e4f2404b49f89889e35dbe87997fab46cee8e8863aa03064fd36a0c8eaacd211527beffdd96966019c7a108475f63168d869a961e9fe93d1ffc6fd7e2f864d8812cf5c251aef13d41409aba3e321d6afc6a899d21210", @typed={0xd8, 0x68, @binary="7ed96ef620aede06acd4b47ca028bc145529c8352c711fa5449e183ccc6236522b2a16f37ff8c189885d0737f94d0d9707ecee07239ae7c45f9d19a4cb622db3685018e429967801555e88330aaca06f3cbe79358426adb70466cc80861a03943db60ab129c70dd92d108e5e834274bfa245d2c6f9f8d24c3d7c2573d378d0d6b351921db1034c6aa375f422d2cc19fbebc89324a280df954231d6ba41a64ba7e9f9584b9e1078d4fff4aff6b3cda66d07d216aed0d39350f5e3e182f16992587249c78e55abfaee62f5aa87b46f8322286f"}, @typed={0x8, 0x88, @u32=0x7}, @nested={0x290, 0x15, [@typed={0x8, 0x2, @u32=0x7}, @generic="dadf19145c5c2097077e63804938198f64f87f19bc7c611f2f695cb83e1c1dea87165e3b0bd119ecb7f10b4563a67e1dec9576466ea49359055da017e1a8b91ad79fe9478e399af1083c28fd86ea29c22fdcca335cd4bdccb2d5744640cd2f26c34cc3e23d9d94a0080b59ae5b4833b762f4e8dd0a9eae5d13e0d9a3e6823c896673330f8b7d", @typed={0x8, 0x30, @u32=0x8}, @generic="2a982e92dbc8322d13a7904f1c62448a172aa9d23be410b6278245d0c1e682b925193008bf0c761739fa4cdda9829317cab5f6671e320dd7f64a38ceebfac260d7e95ccb5923eaf4bac54cd49e2bddb28a5db47c69b2c2e9eb64f4f46af01683e2", @generic="1adffe5e92b7526ae561439105d4c7512514cb1254690b3220ae02fde296c1c76b7b9a201123c562754bfa09ba56ca853105d6c8c291131bf0efc7e56dbb178088f1d242e1d6046b74a845a293be836dda72a9c2848cdbf1866691e0604bab99ad9ad14f5c465e68015aa4a253f46caab98249fbbd6d58e2d7a1ecab73ca05bfad50f7c6971596edb41f13f4fe1da71e9d6936ab1e7c8997fe7a1ffd93a0162f730c39d5d9b56ee0a67d1f9b46532ea6943127ba611e5331be5921bdbf9b505689404add37ae9c4965ff9c8c6b4fe13de2ed1d0475bc3cc19c4cc866ddc3", @generic="5caf334ac9c308a59e4c557e89eca836fd99de168d9266d089f471d62ddd9311abe398a32d0a3f9c53e96ece817af2b21ad4ad554585f9d7ec345a3fd6a75aa21bf7ac9446d39e8a93f7ca8b3842bbb6ce7144a7c69249849eba0553ef6fc9229753d3c627a08552327f3e895010fb7bfa8f2744db7582bcc562d0714d5ab3da2e3f794f0b66bb0b9ac2ed00f8532afd2ee30969ecaa56e71b1720037224d50771c06519a7f56f4113adbec45f81f7cbf3b39e45"]}, @typed={0x4, 0x1c}, @nested={0x250, 0x2a, [@typed={0x14, 0x69, @ipv6=@mcast1}, @generic="d9daf3591206031bdb72f5ea87e1a0f4a096be5260a35cb0389b9310ee109132420a3a3bc863c11685d49f41ff23b0f4acd745e125725b656f91993ffebcd7d7280077edac1cc870682aac86a7dcafc814140b9b7f00187822610b1be9fdcc261e0d0f88fe893aff29310da7a1222e7b6a03fe0f363dc68db0f2eef7cc15be984df4cfb3e7049bdea0c22b0af49a317461504562076bd87be5813e37bb1b0a7569b562a8032e2ada7a5922", @generic="5ae3005767a4389f80c7a54094e25a3d86690d97a584c1c0bfa5974ef52c2f4e20a1e225d176cef855dbde3a82f72dc3e55e09f81b79dbe00ae89e3595744a2076d4a99e22", @typed={0xc, 0x2, @u64=0x5b}, @generic="56ec28c0ef6a5d05e6a54f7c2de8c5bdc08664d62f62426ab942e14c0988", @typed={0x8, 0x73, @str='\x00'}, @typed={0x8, 0x8e, @pid=r2}, @generic="212b14aa6ae5f755e6679e446b4eadde6355f6c446cb1c53b0fa98228bcad9d99a08e9d2d4a7ebd68a58c2ff99b9b73262cbc2ab785e693c6b271c2ea7cae462bf7a44d0e1c1befff2223de33db8bad5ba5de5a37258a08f3a98787fd9b99c5a6abb69d227733f9b7d845f7d246c41fbb75e5fd784e323f5e144ae27ae6764901d47185a973e4c93419bbf52d5dbb5f9c81a61d723de", @generic="8d17dcf6bbbf78d3bf5ce778c0e6971bec2eb101a997b21517de47816b89d75c0578c57a71eaccdd3b36790f6fd2be9f2bb7e1c6dbd2fb367353002663f86e1b84d03229db15b4ed02bc707f9f0c9ac53246caefd658b1abcdf09f10690a4feb44604744e8a9d33fc03ffebf607ae8a6b5752d962c6ff5"]}]}, 0x6bc}, {&(0x7f0000004b40)={0x2060, 0x13, 0x104, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x14, 0x7c, @ipv6=@remote}, @generic="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", @nested={0x1020, 0x2d, [@typed={0x8, 0x5c, @pid=r2}, @typed={0x8, 0x66, @pid=r2}, @generic='t>$', @typed={0x8, 0x39, @ipv4=@empty}, @generic="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"]}, @nested={0x1c, 0x61, [@typed={0x8, 0x4a, @str='\x00'}, @typed={0xc, 0x78, @u64=0x7ff}, @typed={0x4, 0x39}]}]}, 0x2060}, {&(0x7f0000006bc0)={0x314, 0x21, 0x500, 0x70bd26, 0x25dfdbfc, "", [@typed={0x14, 0x40, @ipv6=@remote}, @nested={0x1f8, 0x4e, [@typed={0x4, 0x1b}, @generic="cae610426643a7bade1e7c1f0f9316f0c0a7be450d22c209034d07997591133fe707960e85e6ba9bca8cbffac395b5d507c7cc2f263ea803ab0fbb4e88e3fbebe644415dae8ce3cf6b5ca7eb62b225d11b32d9fd85976d5f6f3899b418da72b45338fa762504d15393cc", @generic="5804815de73934086cf0ce74e584a8ec6f28c390dc09ec1169e1a557642751ff990800c98da2ef1203cf59d65ac71d0d6fcb122e00d6669c1f45e8c1d533bf3e1ee99b53e07d3ed75f34c2fe0a19807c6995d638ab36ccb01d1fc7d4561b5c91e921bbbebcdd925ec6c3b1f59b067857d26fb69de8f517f93c46b98dccdbbea638394fb1400eafeb3ba5778f40f936f9fd4ddfa0d42294b643e42b70cd30646b9badf83b90a38242ca53237f1b9df8f88a79", @typed={0xc, 0x46, @u64=0x4c2f}, @generic="e22459bfeb24c165673d7c794f3501113e63e77f4e702355135376f7429e5d31a801a5995747fb741662fd3ef175c234636195ca2b3ff27f332594a20cc49527f0d14bbde2db065b7e571f91976fc46efdba138b7d2ecab756043e11a1c6be7a0f7308e947223ed205051331441290e98f21fa64113bf24b016f37703f0c4e0efa9639d2868988b0392137198f719dae633b00d1507e15417f32de91a08d0c478f246f9032234d696493f4b562b7b49e12db5500c4a4397d8d2c3e2706f9e213da10eee82097a7d3"]}, @nested={0xf8, 0x36, [@generic="61dda6c27603f1b0d60055c3206e756c6b07318aade1b478bd97062ce3d699b70e5c9311a8fafe708efb02b4e721a89087e50c97829ce38cd6c7b8b35ce7c96e697e28b91150f3bbda46e8b7af0251f3812fd7933cdc7e1e5c078405a0d862e0c41677568f8b0722a5fd3683e4f66d65e2d2c5b58492720d9c381b4a7ce28c9bd87ddd9f9c11545ee65dc795021701652246cbb6aeb242eb8253fe754b5ddfde65903384f0f7", @typed={0xc, 0x29, @u64=0x80000000}, @typed={0x40, 0x54, @binary="e0b4bb7f1f52c47a099f32afe655f96a856a43c2ba9b8c9f7628357bd4b78323e771645c815751cab86d6cb1afc8e1b2a9489f5b3efd6d950158c3d1"}]}]}, 0x314}, {&(0x7f0000000280)={0x24, 0x2e, 0x820, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x4, 0x6e}, @nested={0x10, 0x91, [@typed={0xc, 0x7a, @u64=0x9}]}]}, 0x24}, {&(0x7f0000006f00)={0x16c, 0x10, 0x400, 0x70bd27, 0x25dfdbff, "", [@nested={0xf8, 0x64, [@typed={0x8, 0x24, @uid=r7}, @generic="9b8002e32ca03c4c87fd3e4206d98dcdae1c5fd8d465fe81b3936a21ca0129392d21b02f1d4d037936ac8ca89b53f51513bbcd76fb89ecbabb72f04587f25257cf3400dd23232c0b0de2e920bb37d44c168e163378c4b2bd2d141fb1c18aa95464815a07afe9301ec2f6f65528ed8496a193e83a59d968d0c3ebbb2cb3187f109a4b4c7b90989296584da3900fe6f5277ca8c45af28d2ff4de2f919fa25eea6ccae919149605b0c77ce6d4cd2807c352d5ec4fc877cefc8953f84e51781056d8a2526626d6011cc356f40a77276912950284d770037da9c03655252b26a70f0694e6c0fb0d700099c9f23d41"]}, @generic="9250b52d6d9e69ab0a3e8f72b76ae079e8c35104ed8b35b41e00ba50fad8e0ac8eb454345fcbf60fa6caafb64f93fa95681396d30edb255980b08b26a6fd48208641b2265008802dc78fad031b33a3759b134a3eb16d68eece8c802775d7f9ffef90"]}, 0x16c}], 0x8, &(0x7f0000007240)=[@cred={0x20, 0x1, 0x2, r2, r8, r9}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}], 0x60, 0x5}, 0x4008000) fcntl$lock(r0, 0x24, &(0x7f0000000100)={0x1, 0x7, 0x7, 0xde8, r2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000007440)="c47579742bf822612a4fbe0980d26caec38e2565ee35cea209e71a3344ce5690d201ce87cb79f645046229289e1de4248d6bc4ec19b4cad604839c8704bd24968fe69b7093cdab1cfcfc4602c72d885fbfdc44d709b6f77e49fbdd686e1995cf8d3da34d589213f36807fe433b9e163a431522846f5a269a7e02260ebfcec77a3dc0ab237a2ca0c188e8d07b633c45bb19177ca290749b92abe26a2a6a895ca1b23a8426615e38786de9437a755432a9c32305d89361"}, 0x10) 09:12:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0xa7) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ptrace$peekuser(0x3, r1, 0x1cfb) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0)='@', 0x0, 0xfffffffffffffffc}, 0xfffffffffffffdf8) 09:12:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0x4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 09:12:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8932, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0, 0xffffffffffffffff}, 0x20) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) write$FUSE_BMAP(r1, &(0x7f00000000c0)={0x18, 0x0, 0x1, {0xb}}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x30}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000840), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r2 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000200)="c6d9b72a5ed3f2810806b6cf1bea8acd3319af226c9c552d7682a7eb0b36aaf4fbdeb8d3142b837d4292ee10b04bf76e65f46826f31e24d3fd23f73828c1058c1c968bc95a77fd4b9bfba00aea85132eabf814bdca230b25ea433ea3a2b10d7086f339f3655284b438185ff00ea0b99b5587c49d762f15f00740ff8b238457d8ff96", 0x82, 0xfffffffffffffffd) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000740)='/dev/null\x00', 0x0, 0x0) write$FUSE_STATFS(r3, &(0x7f0000000780)={0x60, 0xfffffffffffffff5, 0x6, {{0x4, 0x9, 0x6, 0x7, 0x6, 0x0, 0x0, 0xb0df}}}, 0x60) r4 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000440)="27f0dbab18911dd8caac698f1417ddef147e5574a99a93202f97ac4656d1b9b0de286cc321c88f894d8fa73535a6c17a2c5195a2f7ec50808d70bbfee96e5451d4c25ac6a9bf15bc80e662f537ed6017dee2e71c07c3c74103993af55da132b88dc5ea03a4f3594c3983ccd7954cc6ec09a3565ec0e755c4aba948b7060ca51d3ed8141550022bf3e565c225e43dffcfc774f4debdb34e28708a35b4b0396c1c18bf523a8578756dbc0280a265ff0dd4bcca2d0d3b7cbdcb1807f7cf5c51cce112172512753b22ab6526198b7fe3f8e629de85f8c72587f867c2dec42196b58f8a93cc9fd44c3f57f02eb334f224a34070e30662", 0xf4, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000340)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000540)="c2f0eaac47c825c584111a8ddf1179bb9a04f3fdf038e5a5e9dfbe9b4acf6aee9ff5495735c92b7b5f2575ca42218ef7cd1226d594645acb36a8159ce4634d14e84cc78f38e886482d3196abcb11bd2808109a", 0x53, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r2, r4, r5}, &(0x7f00000005c0)=""/186, 0xba, &(0x7f0000000700)={&(0x7f0000000680)={'wp384-generic\x00'}, &(0x7f00000006c0)="46d4d80b97e448db1235452a3f715b7247429b9f0f8987972d1e82ff82703e94270c84fcc225bc99e16888b1e3ad0d5d0fcf4c8186f03a54edd65217352138", 0x3f}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000800)={0x2, 0x100000001, 0x800, 0x1, 0x81, 0x2}) [ 468.753927] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.760498] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000200)=""/186, 0xba}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/227, 0xe3}, {&(0x7f0000001440)=""/234, 0xea}, {&(0x7f0000001540)=""/171, 0xab}, {&(0x7f0000001600)=""/223, 0xdf}, {&(0x7f0000000180)=""/38, 0x26}], 0x8, &(0x7f0000001780)=""/4096, 0x1000}, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000002840)=ANY=[@ANYBLOB="01ae4e45e332b062350dd669936faede0c2e918bebdcff000000e74a008000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000027c0)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000002800)={0x8, 0x2, 0xc, 0x3f, 0x100, 0x42, 0x24a, 0x100, r2}, 0x20) [ 468.884719] device bridge0 left promiscuous mode [ 469.197107] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.203770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.212406] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.219447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.227867] device bridge0 entered promiscuous mode 09:12:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557c"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0, 0x4}, 0xffffffffffffff08) 09:12:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000240)={'security\x00', 0x76, "0b6c06af43bc59eea549bb7ed04c29bfdd33c60b4c7b23ccb5aeb61ca96dd892b227d0a780f5b6e69849fc3f3d0b30553fdb66ed9492dd275129be62fd33b284b9af210f19ad11281d81392762aa10f1d80be9ccf937ec34a0244aba0e40e0f7f737b4c00b52f6ad931cdd8cdc8f988e14de72e2023e"}, &(0x7f0000000000)=0x9a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xe, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x40000000000004}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000080), &(0x7f0000000100)=0x4) r2 = socket$l2tp(0x18, 0x1, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff}) setns(r3, 0x10000000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f00000001c0)=""/97) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x7fffffff, 0x200, 0x8, 0x4, 0x8001}) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) fallocate(r1, 0x11, 0xffffffffffffffc0, 0x1000) 09:12:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 469.242004] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 09:12:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x4, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x7, 0xffffffffffff0481, 0xfffffffffffffff8, 0x0, 0x81, 0x60000, 0x4, 0x0, 0x6, 0x4, 0x6, 0x0, 0x5, 0x9c7, 0x9, 0xd025, 0xc0000, 0xee5, 0xffffffffffffff81, 0x6, 0x2, 0x1, 0x80, 0x9, 0x7, 0xff, 0x2, 0x5, 0x2, 0x87, 0x83ec, 0x400, 0x7, 0x6b, 0xa0, 0x0, 0x6, 0x2, @perf_config_ext={0x0, 0x36}, 0x8, 0x2, 0x1, 0x0, 0xa48, 0x5d, 0x7}, r1, 0x2, r2, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0045878, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x240000, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000180)={r2, r3/1000+30000}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8000, 0xfffffffffffffff9) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f00000000c0)=0x6000000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000180)) getpriority(0x3, r2) [ 469.458669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:12:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8949, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 469.502899] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.509466] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000180)=0x8) [ 469.582533] device bridge0 left promiscuous mode 09:12:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557c"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000000c0)={0x2, [0xfffffffffffffff7, 0x6]}) 09:12:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff070000000000"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x400000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='losystem]vmnet1securityem1\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5451, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 469.949804] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.956222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.962979] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.969407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.976157] device bridge0 entered promiscuous mode 09:12:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f00000000c0)=@abs, &(0x7f0000000180)=0x6e, 0x80800) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000340), &(0x7f0000000380)=0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x80) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000200)={0x9, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e21, @local}}}, 0x108) 09:12:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8971, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 470.140466] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.147041] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x5, 0x0, [], [{0x800, 0x0, 0x7e13dceb, 0x31, 0x800, 0x6d1}, {0x81, 0x1, 0x5, 0x800, 0x7, 0xffffffff}], [[], [], [], [], []]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 470.214901] device bridge0 left promiscuous mode 09:12:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x7, 0x2, 0x914, 0x4000000005, 0x2}, 0xfffffffffffffe34) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 470.683715] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.690368] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.698011] device bridge0 left promiscuous mode [ 470.890528] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.896941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.903718] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.910116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.916816] device bridge0 entered promiscuous mode [ 470.923357] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.929873] bridge0: port 2(bridge_slave_1) entered forwarding state 09:12:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2, 0xffffffffffffffff, 0x2}, 0x2c) r1 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000180)='encrypted\x00', &(0x7f0000000200)='\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x117, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f00000000c0)="bcff10a531d125", 0x0}, 0xffffffffffffff9e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 470.936554] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.942980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.973798] device bridge0 entered promiscuous mode 09:12:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff070000000000"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f00000003c0)={0x0, 0x0, 0x102, 0x7, {0xfffffffffffffff8, 0x9, 0xffffffffffff8000}}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000280)=0x5) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x2, 0x7, 0x7fffffff, 0x7a, 0x0, 0x2, 0x30, 0x2, 0xff, 0xffffffff, 0x5b, 0x9, 0x6, 0x37a, 0x5, 0x6, 0x7, 0x10000, 0x6, 0x2408, 0x7, 0xfffffffffffffff9, 0x40, 0x3f, 0x0, 0xfffffffffffffff7, 0x6, 0x200, 0x5, 0x3ff, 0x1000, 0xfff, 0x68d, 0x3, 0x200, 0x7, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x9}, 0x0, 0x4, 0x100000000, 0xf, 0x1, 0x1, 0x1000}, r1, 0x10, 0xffffffffffffffff, 0x9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x20}}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:08 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000440)={0x47240d4c, @remote}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc020660b, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 471.142638] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.149199] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.193812] device bridge0 left promiscuous mode 09:12:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @local}, 0x1, 0x2, 0x1, 0x1}}, 0x26) 09:12:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000000000), 0x0, 0x1}, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000200)="d908a374c0b58f59f055082b044f41e8ef62cf63a46d1d5f6735cc6c607b25b64109d26aa5930a584c81906395f112798ba7528cf40c84e4085b85edf58d307742234e1a32af85130de05965df9ce9a063ffa0127c2dbeab5ef23c3135e2c9ba1f307ff6327f3cb7966b204e5dc2793c2d549bb42581aa302c000dc4f8663003a70cd95965a399eae9cd355698a09320c39b7d78c3ac57447318eadc4b56871b4223429425eb829864890a83b8f93443dcdee06ead5e6fab77a53b5a3c69057095b9249489204dfddeda90d706a7f12d4766", 0xd2}, {&(0x7f0000000000)="89", 0x1}, {&(0x7f0000000100)="c78ba5a06f00c4dcaa8967b28a96e1a20c", 0x11}], 0x4, 0x0, 0x0, 0x4}, 0x8800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:12:08 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 471.872729] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.879245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.885984] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.892490] bridge0: port 1(bridge_slave_0) entered forwarding state 09:12:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e59"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x3f, 0x1, 0x6, 0x11, r0, 0x15d88484}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 471.926485] device bridge0 entered promiscuous mode [ 471.942005] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.948548] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.969470] device bridge0 left promiscuous mode 09:12:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 472.403233] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.409744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.416389] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.422822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.430288] device bridge0 entered promiscuous mode [ 472.438738] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.445285] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:09 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x400300, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x19, 0x2, 0x914, 0x2, 0x2, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000440), 0x0}, 0x20) write$P9_RREAD(r0, &(0x7f0000000340)={0xd7, 0x75, 0x1, {0xcc, "4c985ed811d5c95cb0418923943206b918107fa39e100e790922680a6b53ff7d9324a1af00eaecf0c4ec8f77512437005affa7351448834dbdb070e0ec9915f0d681e2642ed08e32b5c58ecf5d487fec46634b16c57dd4e9f4c4bc28b71c443871931ba01f07f55c7d8412521824622fae13eebede2d1f0352d37fcc66f3e9563ce6fe5ff442a70219704cbbaf46a59b6840668a267634296a71b0c797661aff9722331b1dabf506d98a4b156ae603c6bb477f10f32114ea8e678f1c40f0615146e32990aa4cdb3977b7e2aa"}}, 0xd7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) 09:12:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff070000000000"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2, 0xffffffffffffffff, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) sendmsg$tipc(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)="4ac34935efc56c9b8c23d249b793c412df7d338e6fe16a2a3bd653b7f98fd2a74625da832db7dd0dd51e8e31b3b67fb0af70d48eff05bb3dd128876b3910305ed574fd74551fb6c55b7c73faf74d00a4371689f289665d2c83ebbe8135b6aa9da5dd6ce9ff28faedbdcb3cb62cb2d417246c74c0cdd81158e9872d081d04798c5a042b6d974d35f8cdb0b0f125040dcd9944961aaeb76dfb2bc1257baf28952115377e7c1ab6f1885751185d4909a3ed241f2b4d8ac3a3830253cc420fcc22f40c0fbea4fb5876ed99faac67", 0xcc}], 0x1, &(0x7f0000000300)="93e0b5ce0a59400d552f642b9a7070c9e4bbcf98f4d73b5ca1b91c9e44ba0e336a8826790c97a90d8aaa1340ddd883bd37e933c990b35136b72207f1ff36c0765a38d57b15735729cd288ae3b0c5aad7b110d1bece553bf835f8d5635c2a60f735517cabd16e546a5d0d77285836ba", 0x6f, 0x24004010}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x40049409, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 472.452383] device bridge0 left promiscuous mode 09:12:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100)=0x4, 0x4) 09:12:09 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='$trustedvboxnet0-GPL#\x00', 0x2) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000100)=""/132) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x5040}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000280)={r2, 0xfffffffffffffffd}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000000c0), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000200)='@', 0x0}, 0x20) r3 = shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r3, 0x0) 09:12:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 473.030318] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.036816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.043596] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.050036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.056765] device bridge0 entered promiscuous mode [ 473.065027] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.071606] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000440)="455fa1b4f81e1c185d6da8e21b6711292fa19b475efb57640168c3a09b454c2a5a960ad5838684febe0cd77a04c2f051ce323e517cb48df305313f966d4d98170d3658e1133ab4a85a7b16d199544ad13b5df3c0b1ba753da1117d5f916859a5e367d6dbb887d0dad4ea6d2b27e39eb4bd776809ecb3f0c730ddbe0507e5700ab36991996589fabcef695c8a4d459b5ab763f3e607f9273a10d3f4d963", 0x0, 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x201, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r1, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000003c0)={@rand_addr=0x1cd, @remote, r2}, 0xc) 09:12:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x220000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000002c0)={0x2, 0x100000000}, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xb8, "4cd7466d988841eae99cb80c6571858a925e3fd7e841b36063264072c3fe22bc2f0eea585c570129ccdcaccf447d55b761a673573bcda8aabf7029e959c6e9fa70f508be46d517a91679e54cb8fb481b08b79a3117758415b76321b0baab9157cd8dbf79c67f8731246f564682fc88a56a44cb0ea384dfa4dfafe26914eef9b5e0df8560fc369f37ac4d099b3713dfa94d500d7f2dd1ea47644415401f7dfc628ab0d719aa0a10c138549f52bfd00fd8f3f243c8f889f10c"}, &(0x7f00000000c0)=0xc0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r3, 0x800}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 473.078399] device bridge0 left promiscuous mode [ 473.399089] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.405555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.412331] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.418779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.425590] device bridge0 entered promiscuous mode [ 473.433452] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.439975] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0)="c1d87ad6f8e136831da31414aa0051c2d309fe6de6b2e191c8db1dee81bc77bf6d87f9942289", 0x0}, 0xffffffb9) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x800, 0x0) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="230000006f0100020000030000fdffffffffffffff0000040000000800000000000000"], 0x23) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000200)="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", 0x0}, 0xfffffffffffffd42) 09:12:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 09:12:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891f, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 473.464460] device bridge0 left promiscuous mode 09:12:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2000000000000003, 0x300) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1b, 0x10000) ioctl$TIOCCONS(r1, 0x541d) r2 = dup2(r0, r0) getsockopt$inet6_buf(r2, 0x29, 0x2d, &(0x7f0000000080)=""/117, &(0x7f0000000000)=0x75) setsockopt$packet_tx_ring(r0, 0x107, 0x7, &(0x7f0000000040)=@req3, 0x1c) 09:12:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0x1, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x10000, 0x44003) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000480)={0x2, 0x1, &(0x7f0000000280)=""/183, &(0x7f0000000340)=""/239, &(0x7f0000000440)=""/34, 0x1000}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x80030, r0, 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r2 = syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x2c9, 0x20200) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x100, 0x0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000200)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000004c0)) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000500)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r4 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8, 0xc0000) ioctl$FICLONE(r4, 0x40049409, r0) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x2000) 09:12:10 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x301800) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:10 executing program 3: r0 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(r0, &(0x7f0000000100), 0x2d) semtimedop(r0, &(0x7f0000000040)=[{}, {}], 0x2, &(0x7f00000000c0)={0x77359400}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x408240, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100), &(0x7f0000000140)=0x4) prctl$PR_GET_FP_MODE(0x2e) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) [ 474.064394] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.070977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.077705] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.084295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.091090] device bridge0 entered promiscuous mode [ 474.102365] bridge0: port 2(bridge_slave_1) entered disabled state 09:12:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 474.108883] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.126293] device bridge0 left promiscuous mode 09:12:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x0, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8943, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891d, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x1145c00000000000, 0x3ab56be64c666a60) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x2, "a472"}, &(0x7f0000000240)=0xa) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0x3, 0xc, 0x1f, 0x1, r2}, &(0x7f00000002c0)=0x10) ioctl$KDADDIO(r1, 0x4b34, 0x3ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) uname(&(0x7f00000000c0)=""/74) [ 474.547146] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.553776] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 474.683299] device bridge0 left promiscuous mode 09:12:11 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x18}, 0x5d}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x8, @empty, 0x7fffffff}, @in={0x2, 0x4e20, @broadcast}], 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xf, 0x4, 0x4000000004, 0x6250, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 09:12:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x5}, 0x20) 09:12:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x800) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @broadcast}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r2, 0x7, 0x5}, &(0x7f0000000240)=0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 475.143655] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.150124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.156832] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.163278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.170031] device bridge0 entered promiscuous mode 09:12:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x0, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x2, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x11}, 0x20) 09:12:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f00000000c0)="bc7a6ff5bf2e24638c0cbed5990d6e01df1c1283c24347efd2bd8d368d5de7e109e9fee9fa2bfce8049c84a74de0ac7ef6c0d19638f7b2b2c7a620", &(0x7f0000000200)=""/229}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:12 executing program 3: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x03\xb8\x98\x00', 0x101}) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x3, {0x80000000, 0xfb1, 0x8, 0x10001, 0x1, 0x20}, 0x7fff, 0xffffffff}, 0xe) 09:12:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) 09:12:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x98, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x814e}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xc8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4b1}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffffe}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x4) 09:12:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x12}, 0x20) 09:12:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0xf}, 0x20) 09:12:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x9, 0x80200) bind$unix(r1, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 09:12:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x4}, 0x20) 09:12:12 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x20000e, 0x8001, 0x2, 0x4000000005, 0x2, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)='@', 0x0}, 0x20) [ 475.893495] device lo entered promiscuous mode [ 475.905022] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.911600] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.922612] device bridge0 left promiscuous mode 09:12:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x8}, 0x20) 09:12:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x1, 0xc08, 0x20, 0x20, r0, 0x21}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 476.155524] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.162017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.168775] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.175132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.182153] device bridge0 entered promiscuous mode [ 476.187892] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 476.198991] device lo left promiscuous mode 09:12:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891e, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 09:12:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x14}, 0x20) 09:12:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x0, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x7) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) [ 476.517079] device lo entered promiscuous mode [ 476.524495] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.531434] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.540965] device bridge0 left promiscuous mode 09:12:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0xa}, 0x20) 09:12:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x13}, 0x20) 09:12:13 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7d5, 0x400001) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000200)={0x3, 0x2, @start={0x10000, 0x1}}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000100)={r1, &(0x7f0000000440)=""/4096}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000200), 0x0}, 0xd35e994deecebc03) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000180)) 09:12:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) getrandom(&(0x7f00000000c0)=""/120, 0x78, 0x3) [ 477.227814] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.234364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.241180] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.247536] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.254418] device bridge0 entered promiscuous mode [ 477.260158] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 09:12:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0xb}, 0x20) 09:12:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000200)={0x7f, {{0xa, 0x4e24, 0x4, @mcast2, 0x47}}, 0x1, 0x200000000000262, [{{0xa, 0x4e24, 0xe9}}, {{0xa, 0x4e21, 0x234, @loopback, 0x2750}}]}, 0x190) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 477.280199] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.286750] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.321501] device bridge0 left promiscuous mode [ 477.629984] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.636465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.643203] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.649605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.656340] device bridge0 entered promiscuous mode [ 477.662753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:12:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5450, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 09:12:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4000000, 0x200000) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000200)=""/179) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0xd}, 0x20) 09:12:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 477.679240] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.685714] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.700408] device bridge0 left promiscuous mode 09:12:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = dup2(r0, r0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x20000202}, 0x20) 09:12:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='team_slave_0\x00') 09:12:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x10}, 0x20) [ 478.245562] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.252154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.258919] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.265375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.272235] device bridge0 entered promiscuous mode [ 478.280733] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.287183] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, 0x0, &(0x7f0000000280)) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:15 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x10000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xdb70}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x59, 0x0, 0x8001, 0xd34, 0x5}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0xc}, 0x20) [ 478.314755] device bridge0 left promiscuous mode 09:12:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0045878, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) 09:12:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xc200, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f00000000c0)={0x0, 0x6, 0xd}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x3}, 0x20) [ 478.661543] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.668052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.674826] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.681248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.687992] device bridge0 entered promiscuous mode [ 478.695414] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.701905] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, 0x0, 0x4000800) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req={0x1adfa76e, 0x1, 0x7, 0x1}, 0x10) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000080)=""/169) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0x94) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) [ 478.726746] device bridge0 left promiscuous mode 09:12:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x9}, 0x20) 09:12:16 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqQCR\xca\x14\xbf\"\x8c|a\xa3[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0)\x04\xa3\xcb\x9f\xb8\xdf\xae\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\x00\x00\x00\x00\x00\x00\x00\b\xd6\xf8\xca\xf3J\x15\xed+l\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7g\x84\xa1\x96\x93\xaa=-z\x06r\b\'\x93\x18\\\xf6\xa8\x83\xfc\x90\xe7\x86\xdb\xe8\xb8\f\xc2}0P\xd6V\xadH\x11F\xb9\xe47T\x13d\x0f\xa7\xf8\xc6') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000000240)='net/softnet_stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:12:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0xe}, 0x20) 09:12:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, 0x0) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={r2, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1ff, 0x8, 0x5, 0x6ca, 0x40}, 0x98) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x7}, 0x20) [ 479.257647] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.264165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.270965] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.277345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.284209] device bridge0 entered promiscuous mode 09:12:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8930, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 09:12:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 09:12:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x6}, 0x20) 09:12:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8941, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) [ 479.578611] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.585106] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000000)=[{0x0, 0x0, &(0x7f0000000080)}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/116, 0x20000574}], 0x1}}], 0x1, 0x0, 0x0) [ 479.637413] device bridge0 left promiscuous mode 09:12:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x15}, 0x20) [ 480.067033] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.073535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.080308] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.086664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.093517] device bridge0 entered promiscuous mode 09:12:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x48) 09:12:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0xa, 0x2, 0x914, 0x5, 0x10, 0xffffffffffffffff, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @local}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) setresuid(r3, r2, r3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:17 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, r1, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0xa, &(0x7f0000001540)=[{&(0x7f0000000080)="b8b6fc9e332292af9eb88c71f1cd63dd6c4f64d4f0f48d06802d6c2aca488659c1951a36ef332e1b6bf1c4144c282d994f3d7f5116f1c6c5fc2921be4f717a0ed362629a53c2ff5f", 0x48, 0x7}, {&(0x7f0000000100)="153b0027d5212270e0f92f61b1614da57ca0760fdc7474cb592e9d3403082965e2b4bff63a4b6931c2da11ae3d0bd4292f4dcfc358bc5fb4225d84ad80e6eb7d07e9bd90c3d2dd39", 0x48}, {&(0x7f0000000180)="f7c90d136fb8cf2df7977eb809de05ce677a3eaec6cd2a09c8bc10a838ecf3c0bf1e93a7f0a644837d0d8c5f7eba89f5943ff6f2200010e5dd8a5adaab7784b27a25ae2ccfa03a141857a45c55b85a84578580befb8d347924921678fe23f2f92776e32409520ecfe2bf91d86f0b163b", 0x70, 0xfff}, {&(0x7f0000000200)="4e8750550c7cb42b75d1b80cc31c505138e33eb32e0bea7e0f03ebed43f7f3ae99b297b281a6cc3acc077377610475939d62a9e0323d5007744cfdbc6285196dfa99bbe0225b35c6410db1e5fb9e49440ccdeadc8d1f5da192b4bcfe31e1603f20d6e492b402e41bffe76d76dd4da8d4c07e0e66634728929d78012396a4611e25e182d3263892ced84b5808d67cef77674d3e6f0fd6229f689de76dec63402d6e2dd711eea3004959629b56ec2e1223c20149037f5f9c32ea70a3735ce5ee24784deefb10a0297f039e76bf613a5d6f7027779572375b3e6d94b008abc63b76ec773293047e416aaf79ca6697b0ed05f8ed5b", 0xf3, 0xffff}, {&(0x7f0000000300)="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", 0x1000, 0x4}, {&(0x7f0000001300)="b46d3530abdb795135d2eb7d2b9651463dd29f48c6a3b38f239d7b2cd9c777b0ba", 0x21, 0x1}, {&(0x7f0000001340)="9dfaa5f7a3aa1937771c2ec3f0d12305fa697f7da9b7faea3c7457a8995804a2a057d925b68a220650a9ab1bba9eb066357964a64b42dd1dbf85d4a9", 0x3c, 0xe2b8}, {&(0x7f0000001380)="4a43e35fddcd5fb82da94c336c1c0640b18b320fd50ee4cbf8600c23970bfd764fea108d0dc0b199aff701a40c28ea03e5e28f110e571ba65dcbb4caa2a2ada05befed73d33c91e591cd3fcaecc1d38d4de2064d8bf2c0300050eb593f8ec323add8b1611448fdeccccafbb32a8d8677f4d61217121544d61bb3964fb984d7be30bc5081fdd2dc00c00e4e04", 0x8c, 0x5}, {&(0x7f0000001440)="da1ec1b43c40d84c4600eae633717c27d04a9e907734202870f796b8532a4df6d55164ce2c59bdcf0d8b1e9ad0104506791313608f397eb6065d933f661586623ea57f2ddf3841d8b51901d477aad57c48da4aed55edd4172892920035a41ec44fcbf384484548b1689ec5bad1d1d691b1747a82902d9df419dc54898c12e329254191d41e136207562c856a1be691545de7103ed689484c5e9e9db8e9d0d44157b64c9dee8ffac06f5550e04375370fee7a", 0xb2, 0x11}, {&(0x7f0000001500)="1f9e76e866a838c4fe8f8f2fd1e2cbaa74d1f6978f243e273869fecc68b40e1368854770076825653ebbafea0f85a5a81f100b238a2cecf11086", 0x3a}], 0x80, &(0x7f0000001640)={[{@pqnoenforce='pqnoenforce'}, {@swidth={'swidth', 0x3d, 0x4}}], [{@dont_appraise='dont_appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x38, 0x37, 0x34, 0x76, 0x35, 0x34, 0x39], 0x2d, [0x0, 0x77, 0x0, 0x66], 0x2d, [0x75, 0x38, 0x0, 0x8092462d35259955], 0x2d, [0x76, 0x32, 0x65, 0x67], 0x2d, [0x34, 0x65, 0x66, 0x7f, 0x31, 0x77, 0x77, 0x77]}}}, {@obj_type={'obj_type'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'md5sum'}}]}) ioprio_set$pid(0x2, 0x0, 0x5) setfsuid(r1) 09:12:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 09:12:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, 0x0) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8911, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20000020) 09:12:17 executing program 3: r0 = socket$inet6(0xa, 0xf, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @broadcast}}, [0xd8b, 0x1000, 0x80000000007fff, 0x8, 0x1, 0x589, 0x1, 0x7, 0x7b5d5599, 0x10000, 0x6, 0x7f, 0x7ff, 0x2, 0x3]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21, @empty}}, 0x7, 0x3}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @broadcast}, 0x1}}, [0x0, 0x8, 0x7, 0x0, 0x7, 0x6, 0xff, 0x0, 0xf95, 0x3, 0x2, 0xd320, 0x9, 0x9, 0x3166]}, &(0x7f00000003c0)=0x100) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x1, 0x2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101000, 0x0) ioctl$VT_RELDISP(r3, 0xb702) 09:12:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) 09:12:17 executing program 0: syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x2, 0x10000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getresgid(&(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x200, 0xd0000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x2, "7ef7"}, 0x3) [ 480.390007] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.396597] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8916, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 480.450240] device bridge0 left promiscuous mode 09:12:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000380)="eebfacae0ea37dab2bc5e93afc3170414de93239f04f4e85f83cfd010dfc4015283bb4b59bfe", 0x0}, 0xfffffffffffffe22) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f00000002c0)="74a90dfa63ebceb74e29ad7be024fde696f0c0b3c54b78423d41a7821186cd58a81c74b684b732977bfc1c4759d7f37cd3e624c048b07212ce8c6ce5504aaa773f2f60855265f204a77ea26200a1b947358d73bba9273ea67cdb8f85c720dce9838b"}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x40, &(0x7f0000000200)={[{@nfs_export_off='nfs_export=off'}, {@xino_off='xino=off'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@workdir={'workdir', 0x3d, './file0'}}], [{@subj_user={'subj_user'}}, {@subj_role={'subj_role', 0x3d, 'vmnet0-eth1selinux'}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@dont_measure='dont_measure'}]}) 09:12:17 executing program 3: clone(0x802122101ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f00000004c0)) exit(0x0) 09:12:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$unix(r1, &(0x7f00000015c0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000000100)="fb185ec6805b31763502f9922eed6b7a2caf106db72acf73c962a5fbcda63ff410d8f5ad15e83d8aa6161da548cd504528a002abd9190706b31a71318e1b6f7e49d67b47efc141956cf7f3a58f5e0047f234eba44f27c49f0fb62c3592ecd3a659f704accfc8a554", 0x68}, {&(0x7f0000000180)="eacdbfba2b1f5d2c65ffe1be6901b41068d6d854b463c3f42ec561f4562cb3a020004e1547c4702c72da12745f4dbf9590c64dae7baf5bf22ee92e36e5d2975aaece53cf150de36b", 0x48}, {&(0x7f0000000200)="94ce6cc6da6145553bd429bc602d3982f4fc95dfcc02685786831b416af21d941e04504f8f71caeb71e069de5be13a9d31b28c236f93c1b32035f3e1767e8e8309cc928f3e0b0802df5f03a7e4", 0x4d}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000280)="25b07ab56fa6b173e99919e3d59eede8d4cdc7f720e02eb956db6964620e5e43433d56a4f7b3cb04c086a8f768d4e02a011638b114dcf66c985cc504ff8bffd44a1c7b6c8be1ff545609ec8cbec2a493abe0d72040fc163a961aeed08deff8b0edd33d1b41a614b5b3cdcfd331648a2c52de576edefc27ca137864b82883572619f7af73e31516897381298de78dcdb063960dce256e8ab32b648103bcf8b335943c1d053931612cdb240ad5f83ebad87d1f84733d42fe19b23313d61ee64cb6af36bfa269eb189771e44bd437dbd044d75b5d6d0ac418e1d4645f7ac6c7e97ea988401aee768fc7eb", 0xe9}, {&(0x7f0000000380)="622067add9289932e0a1e6f7da15a150e1b40d2891b9757e17dacef7fcdbda9d48a1b1fd0beaf97cea56d31ab04aeb82d92ba8f6ced8d8121ecb274876d411e3bba4dd967488599510ad49049b470eae18a4b43d3f4ac8d30e940bcf431e9ce763019d", 0x63}, {&(0x7f0000001440)="cc0642750cb9987b187ad30bf0712b7f09bec3880d44bc3722e3bb1d47d4102b44894f3d92dd4378246e65c0c5abf35856b485303021b199c4bace368e21925018bb2bf2b6bce65350ba5ef02d593d58a6c895c357d7a42ecd6f6fc2737c98c2ff3862c3535d87d7d1f89f4bdd59d7876d8f8b01850d9d5d7a50fae2c0f62526833f8ef59053916748fbc8465cd5be5e0dce2ca5597d1f701d8567b32e0a968da28e6f3863ddfc705cdd430d4f69f6f7004c77cc0c3078284c471ac936a1c4b956c166086046f58ab3", 0xc9}], 0x7, 0x0, 0x0, 0x4}, 0x44011) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001ac0)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000001bc0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0xc, 0x7, &(0x7f0000001600)=@raw=[@call={0x85, 0x0, 0x0, 0x42}, @exit, @ldst={0x3, 0x1, 0x1, 0x9, 0x7, 0xffffffffffffffe0, 0xfffffffffffffffc}, @exit, @jmp={0x5, 0x7fffffff, 0x3, 0xb, 0x5, 0x0, 0xfffffffffffffffc}, @ldst={0x2, 0x3, 0x7, 0x3, 0xb, 0xfffffffffffffff9, 0xfffffffffffffff0}, @jmp={0x5, 0x2, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x8}], &(0x7f0000001640)='GPL\x00', 0x3, 0xf1, &(0x7f0000001680)=""/241, 0x41000, 0xc284d460de44db65, [], r2, 0xc}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) socket$xdp(0x2c, 0x3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) 09:12:18 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000004}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r1, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040}, 0x844) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x5}, 0xb5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(0x0, 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e23, 0x7ff, @remote, 0x4}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0)="c190102a225e9f5293d181c5b3b89ec26eff6e6e7dc9f71505041559c8177ec925272a79e1ddb77b674436bfc6e6c33ef97a98189feeae73d1fef6cc9059f89adc495126d1695941d1e4bd7d79bafddef66316840e6d5f0042998f0f942908eb0cfd1cdf2131aaaf3fc04b4f48ab", 0x0}, 0x20) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000440)={'mangle\x00', 0xfd, "fc7f923a04a86dcd09b20df66af76364e98291d958457c9894dbf142ba3975bca4b3fcad41def784a654bc3924371d00f9a84a8643f117df42ef7444ea892d8ec384fe537f905bd7bf612d67e8380af86c1c547224bb259a48045e72b1c12895c7df565ba9aedb1bc7d526ba9888acdcb0f4bddeb2377c98771c19b1aeae906a73f8e1cf8be7cfb3e57b1900ed4d674bb3a7398e8e60bdca0872161706ee96aefcd593a9cec19bb15d09a7f49a890dddfbb2b5636968cc84fb5ed8d0fe79485fafbc4d6f82b79d46ced3f61d73f7c086e6caa2e7e193f7645187f84ed21474c604c65ab164c6354586982da4d4449ec832729d732e5cd56a1bff3e699b"}, &(0x7f0000000340)=0x121) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000280)={0x6, 0x2, 'client0\x00', 0x1, "c97b6637f78b44e6", "4fc593c3b179842e3d4c6c1801e1055dd8f6e20598e070adf143a8df594afb4c", 0x3, 0x7}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r2 = signalfd(r0, &(0x7f0000000080)={0x7}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x65, 0x1, 0x7}) [ 481.073416] bridge0: port 2(bridge_slave_1) entered blocking state [ 481.079991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 481.086620] bridge0: port 1(bridge_slave_0) entered blocking state [ 481.093067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 481.100906] device bridge0 entered promiscuous mode 09:12:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 09:12:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000100)={0x401, 0x2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0xfffffffffffffffe, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r3, 0x8, 0x2}, 0x10) 09:12:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x400, 0x4) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000300)={0x0, 0x6002}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x200000, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000200)={0x8, 0x4, 0x1}) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000380)=0x8) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000180)=0x3ff, &(0x7f0000000280)=0x4) 09:12:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) [ 481.346066] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.352623] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4040000005, 0x2, 0xffffffffffffffff, 0x4}, 0x2c) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000300)=@generic, &(0x7f0000000180)=0x80, 0x800) sendmsg$nl_route(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8001000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@ipv6_getrule={0x20, 0x22, 0x300, 0x70bd27, 0x25dfdbff, {0xa, 0x80, 0x14, 0x9, 0x8073, 0x0, 0x0, 0x3, 0x2}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4c000}, 0x20000804) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200)="4277924fc9af719182f877644b7bb9e1be7598fec7d326baa95b2af0636022c37065b1f87f14624b198d3e235aecf4a55062fb0ffa64b30a8df7a6a0f1675e463bee5cce77f5102764923d6b8f3906865e674399aa95fe73420a07f44f03fc5f4ddffbad43a97b6687d063688a7052e76b8d90f0af544b437f51086c639b3b61ce258921a0035ae59edf8261e5b01cd4c390c940482fb0da0a1c902414258d3f3c5414f86ae64d28fd1f4c586218578368a7d796a4bbd9d1f7e71e03672688b0e248c6dc8a673cd8b073cbbd608ccd5727f7028fe4", 0x0, 0x1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x200000) fstat(r0, &(0x7f00000000c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) [ 481.418562] device bridge0 left promiscuous mode 09:12:18 executing program 3: clone(0x802122101ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f00000004c0)) exit(0x0) 09:12:18 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:18 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000040)="7154bc7f4fc40fc322d46b898ee47b7cbcd47d324abde4d962739b2a0790c5590b61655725755321b5ef33181194c2f6948efdb2ae0fe39cf297818546ecf59f132eec15d300e5a0f957bd54f60af63f1583831ddddcf94dee5da50c5ac3eab53dd23139723d273057b7d492f7217183e97e1e8b076df442c2c0d318659f", &(0x7f00000000c0)=""/239}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:18 executing program 0: syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), 0x0, 0x800000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000)='@', 0x0}, 0x20) ioctl$VT_WAITACTIVE(r0, 0x5607) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x600, 0x2, 0x5, 0x5, 0x2, 0x7, 0x0, 0x2, 0x40}}, 0x43) [ 481.946455] bridge0: port 2(bridge_slave_1) entered blocking state [ 481.952988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 481.959727] bridge0: port 1(bridge_slave_0) entered blocking state [ 481.966095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 481.973419] device bridge0 entered promiscuous mode 09:12:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(0x0, 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x800) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000140)={0x4, 0x1, 0x7, 0x3ff, 0x7, 0x1}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0x8, &(0x7f00000000c0)=0x4) 09:12:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000000c0)=""/39, &(0x7f0000000100)=0x27) ioctl$TCSBRK(r1, 0x5409, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) lsetxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x6}, 0x28, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x41) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) 09:12:19 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) r2 = perf_event_open(&(0x7f0000000140)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x2, 0xffc9, 0x7, 0x9, 0x1200, 0x9, 0x7, 0x1}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r2, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000040)=0xffffffffffffac6e, 0x4) sendto$inet6(r1, &(0x7f0000000280)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be000000", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvmsg(r1, &(0x7f00000055c0)={&(0x7f0000005480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005500), 0x0, &(0x7f0000005540)=""/81, 0x51}, 0x0) 09:12:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8918, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:19 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r0 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') 09:12:19 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00', 0x0) write$P9_RGETLOCK(r0, &(0x7f00000001c0)=ANY=[], 0xfffffd5a) lseek(r0, 0x0, 0x3) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x2ca) 09:12:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x46, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2080, 0x0) write$input_event(r0, &(0x7f0000000040)={{0x77359400}, 0x17, 0xee, 0x80000000}, 0x18) 09:12:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8910, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:19 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r0 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 482.167592] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.174178] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.191062] device bridge0 left promiscuous mode 09:12:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x0, 0x2}, 0xffffffffffffffcd) 09:12:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rfkill\x00', 0x10000, 0x0) bind$vsock_dgram(r1, &(0x7f0000000680)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) r2 = dup(r0) ioctl$TIOCCBRK(r2, 0x5428) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x9, 0x400800) [ 482.786672] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.793250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 482.801677] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.809077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 482.817691] device bridge0 entered promiscuous mode 09:12:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(0x0, 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000001440)="d65d0f192990ed4a4295a80bae08863380af4b56c84b7aa6c1188e3441a7ec2ea3c5bd271722a0bf2a5e28dc6e5fbfffe1ec0f2a850787ab425f090b2e33c175ca38b6419ea9727e23d7c7dc6c4e53525f53a244ea9aa2322855cd66b367adbb42f49f7c698edf1260b8ca86f3f07e39969fb83386bf99398ab81c49853cce40711310a987720d5588098a8666c13ad2af58d012da60da7d73b11d0ba50b2299c72cda30a8553e398ad941009cde75c61fe3272ed1d1cca76662376a6b6d43e916c13884ac44bae63bba23679f5e2942780efed7d9f92295abf71242f96c6c55d3d3e833d8ddbbbce4c5d7d37f9e0586ed4d5fcc55e66c1bce682b60ada693066a80158792df7cb791063bc0d59aa908d0997fe484b21ed1c5be517d88e15343185a12bef1f2530b6b1b23f09a98cd6182c47aad5b3034358120f3b7d9210ecfe37edea6ab0b4d73a0e17238f74407c25b6b310efff3a07c7463ec4a60892c2f4bac4200eaf6f5651ddd92a098ecdaeae2734c5651fb860184e3a249a57ff7eb2dd86178069f25387130a74e03b4b2eaf9cde530a09a5855a67fb5744ebab6600e745c9430b1c882cc39935a7701631b562e627ebc76d7650312b1479748e680c715de23b642eef971f12a5bfa3691d543bf2cc59628a123b673f53cc35012b4f131cc4dcb6daf52bc42cb788ce8a0bf196e848f1531fe027cd7c7750a1185d0ec635b9281f7b5d98dfe1b60728d662b6f3e5746d67c3b4d54d9c7ff787d8a860f2448687b1b461747bcd7d6cf7eb26147cb3e4d7099d9fe395bbb3b17d2d10153d96a09d7a3c22c8ef014753769d2173d2e8d318e036fd43e0cfa8d923b04dd1f6a845b9eec3de2121d6e9a52e6bdaddf97030b4c659db77eac12d348841b7dafa09b6478f2bab160acbf10a9647fd9d83c03e7808d4b67987a3bd582c4297c22b00f83da12197c2c6d5c22c3a10d15b4b1b9462ed2e4f0d79a9f46c124bca610f5abcb0d9b88371dcd98a53715817c1f804865e2507b79b28e3aaf98c97703e95369b438a47d292c40fa5bfdfd22c20cc244a6aea6ea2204d94d7083ae8168ebf39e2de5536a89dbbed7645380d7a4b413912d644e9f1c3cc56886ceb5777deca8c2048a906277077740675ea1c002950dfc21619db0f20f59ffd1433bd385352ffe172b2c55bec3102f3ad91c59be4eb3a6bfef44bf9195ba51c11bca703d9752b620110bba00da7acdd0273c43d4779f4e090ebdbe03a0649af67ba629d607f156f4fd9f7108d2a29cac6c15e69d422a4ef694ac283cd253649932b7336257b6e3aef2cd00eb490ab23319898684e854bf0e777a8f8ddf18b7bcabefd159c2f6b1a33d243801ce6a3a37339b0f9f1a5c4bfdc7949c0d1bc0173e242f01af5581f94e050888ecaa5adc3d644ab371d0cf840a4f91f924a9e2b54816b35d3137695674577628b75c9733c571e7cad8964d725ba3bdb96d9b8d056fac39009fba9337486f5248100d662163bd5f8bba3d196e592d2cb418eafcb303b77056b134615bc78f10f06c34dad18bb9e3fbedf3babf14482a2ed2958b86394b5fed4621aa4627b6a51d4d8fb11ac34f82f5e07cef998d9c4c580fd9a27a454db1c252f9bf07c92554d505c0783b6a752e0771a2453fc68ed79daa648dddb37f3d163a76ac33259a56d9b62de6c89b0205cf7190e5e871b261a23ff84497456f1e67a6ee6daf5efbb55ca2ab4eb30aa2699cb0f0c601fd09dadcb7ade03d82bc4e19be3fb5c1c4ef8145fcb9dbd0c0a2a308daeb586879db506f2167e6305e028ec7d621df535e1d680e2691050478ea23c911e2f0b085463c670051fbdef5e92e8ddacd421980f62cf5d73b34323d852db6201f02f81a98eaccfa9e4816b92c3462750da7cda6fdab56e158e558b100da33637378080a6d7a33f446824a553a3b4be6e192e7a568b3b309916cefdab92304a15ab3d7aa7556c15913f837e979c600e2883ef4231dfec46086190ad8e70eb45860f5e16867d646e45fbf497fa648b33da1a15c6af2e49561bb93c8b7d0d8fb65ed1c6c236959e76f717ea8e465724366c44705f97c6c617db9c514bf81b2f3df453d77be1cb9b8fd0746452fb0cc40a3a146baff9c7ae3af594a8daa98a2eb5ce98eab557117bd17501e740378d6066091ce075a47dc3bb92b191a49e88912b02be1eecad9acf6ee3f48c1b068bb7c8c089394eda97f3d366a8b331191f8cda737193fe014933911975372576c87dd0ca11850fd2221d676547a867a04e0a5334492b11c37f7cfffc30e2d6e655e0b6acccaed608196318f8c7a47bc3c0413e23453ed8a6221214f9696db9c14bac2be3491fc46fdbd66cfc0345bf54805803efbf797214fd217af5d3a1cc1493dbfe8babcbc707957437bbe314a0262a135a7f760b5a59420b72aec42cc1417bd1e1d0f334423c887a776208c42f8665b53bf565dd4a246d57c3a1f330b62714305ec9e4c079c13f1bf787642b0ba5db83de2e9e00d49d63a24473c37fd0de7afdd62091db345ac4aceebfe18b97708474797467940b9bce91b34fdc35f89684f2f011ddb3fe97f364fa13cf253641a046b6d520a919dc88636eb16a80eef5faab70d5cf8de2f625a90f3ec681315fb7561c8650a922c4d92423d5d84d98908cbb7c71397f0ce85451e6005c88617912f70ed5b7d4f339ce896828b6a7030eacadfe1244dd4e4b658f95d83c9d461cacbdae2c12dab9531c9b80417d6ee8729ab7a8ee5c99d95cca5b36f94b5ec1d9c7ca13361c3c72aeaad4c89fd0986853dae87163ade061d58482a4896dc1c86381b5f78d1e7ddb97989e1ba6e5875bbbe673edcfd4a81f2a00a360354290bf270259c66e280b56e7259d61f37bfc2560211f5df84454bff2d6c9ce0db05eecee5e314ca7f75401c9f93ba3f69a7fc1fea4cae0cde4c73bd261d67d4f91282e03c5b2e753f95995ba3383456e7812104315aa80db40d0a2e17ac358f35a453a7924b07a09b084e4f472072e011616b8ceb01d5f2976d64d909894b6e5777cec1121b7be2a80161ca7b7b335da9c678eed20ebb7981f06af9b3d91e010ebe7b0129b87216fb632ee978ef6990b0f62041e8a7d77cfb122acdb707400d7f9e50f367cfdfbe2097e6d58d9ba5777ec123527ba7e66efd4e2348c01c3dd90444c6c3895190bc6a2769693f7a97c1df72783140fada940acd2edb77df58a1efca4dbec03ea53ad3956cd1c4b7b9933e70eb5430300e57239ff02fc5b6d4945082c225f838b8ed3f39ebdf20e4968823a71a058c040024fec49808a4460adaccac9f637a3d0b0569b2eeb992a25887080475f4244247cdc24631ac4c63b0aa99983b7fbc6f3d91eec156e0693cf472c733b13a566fae10bd4f4dfa9a150b71f8cad874d433981c6bd72621c324bd4931b6003711421d99bde8eae100ca1d6f4ffc2b92f33e7b0e83128d337fe9c535aa1caedbace0c5cf0fd992904308e255f8c30b1cb649703d868d3e7860f9459d92592759bf1e97f25611656b1babfcaa3f04d9b581ec9542eb4d82bf31579fc8437475b08d6832b5093f0c20c138d71b8bb3d342fc1bdd9bc1b5625fa42fe47077de5177693bcc8a03712b387678274d482a8e88d0d164701aeac9dbdc123fd29ed70800d3804ef3cc455744284b2d2d64402e5221eb7dd20bdb7e11928501793341685ecab919094feba48fc4c8a6acb113f7e619c0a82a4d77b4a4062282e8695bef3e90b24ec1d739c0844c051dcf77b501971d6a3a2e85fe6cec8e54557518f5eac3c0823f7668df944d3f2af9b75cb4973d923fb75c2e57438e1948c48a22342104f171005ced9b4c301b8d40a5e0b479fadafdc44027b38161d75d29d9b0b5e8f3b76450f61d8c3b07aaeb664701ac689d15601a3a743a0140f3b8dbe1e74e08a571b7f3acc43d651632564635995058ad86bf759e69ff7f2d19382884102ac98711acf4bcead497d8adec831967e53c640ec8d1b94648faec21ea46b8d41cefa60f6c7c0a2fb73f62bf3d3389f719eb4316649a9151643cb91a35ae97bebf0d0c9fdd716f4dfc7f879f39b6f5f1eb27f14380ff299c6ff3ed9fbbbc69477d5be41d9c6827162817ccc93da77a5adbb7d36b2c80e776499f8dfbc219e169e38d407792bb8d9c1e8e38f21d061033992f2121b8586400cc87a929579827f097b101bbd1a8bb7fda0d7aa2600490f1cadebb9d2cf0bdcb2a2c3af1726ea9e2d426402e8c381ab0d6c33fb02458c3efbc26e0be90d9242ab5a8a7dfd10c296cbff59a5416982b7c92d4bf28de99dcab04be58a29c4ae6eb404be828bf89c51f5e8603ca349b217f2fce8e06acc86b8cf280c14b1cc8ab055a111e65ec64e313ac83cfbd362290d7de3b50fd87566163d0c62faae921fef6c4f92aaf41fd64e096e12fb78b1528fa841946f8275570d095db98bf73206d8a2a97413d02985b25d65c9fd095f7696469faf65ecaf432e26fcba40eab2439f97b9931b79219838c9aad56aa732c5468c53c6bd35206412c9610f280a5e4dd7919f19a14702f9995351363638917221d1ad5d794cee65cf096446214b3b7c27b27045af256050bb374b348168c6a816f19eb0373b2f7bbaeffa39ef630235684ea04493e1c11e61845313fd5a8539aa7692c1187741e4b546576524eeb532a6b34ee03166c6db310cd09b0c9a3f837823770677669656a7a995960008e75c2d40190a6ec3086792174e637269b13e5374162bb09cb34668f7b4a982fd87097cbd91e2f08d9683db06c7637e79e95e63b5bda2b80f57797b4394468ee2c2a7e2879b1337e20ab669a991dec44b4300a412202452dc01cff41623a6b68a14e15db108bb554f138dd586fea1c119c78dec4bb44057eb9a47e57a082eac40139a2b0d0f11531d9f9a190d4ca662184bd2656e362b2b3921108749350372eda4b7a62ff7ddaceeb93f4cd9899d060e66b471f759774e1ca0ea7e6c68d93609e3c3f1b30b1bdbf741322f767442d4580486752f82e0d54662f135668209b0fe305663223f7a6d20478ae90631bfc5e7eef88a6dcba60c462af7161dae412473ea1da88ec38a82599984141cb44f375364855a5c8ffbf3d9be0e9418c16f5a02585169fafc703ed29a098460ea2b514426fc418d431848126874403eb0abb97f63a3c0e9d894ea9aef608b8df478c38581b5b68090c5f35645240673191a42facc531f8a18a32261cedae54a43606e79a1601c0c4328aac19ea638d996d4efda87ea7954fd06dff02d2eb777ef6f3ba5adcd26224f05fa05b703ade936d268cf7e15cf6ecdbcb161d8c07663f8883199da5f0890e24b6d44a84c5ab60b21c5dfa94c1f192a2ecdca607797b39cccfc0f7ae2ec0c0158f37d965ad366896dec27a93abcadc0f502b6f3c06a7244f7c8ba528687be5dbba22fa09d3a1e76926b0d331389f33473bd0dd4db3e513d1a0c146e23fd0b80f8f2d109ee17f5ddc2b0cbb67872b4e1b9a66a7c8f270b6ab6149059bd8658a02f26e2118a3afb37b56c6e14b1f8dbccd6907b896efbb6c51743630509b3d9d124c23aa3e9df4e865c1adad3f5381031df29777c60e493366f734abf75e61d01122feff3b1cb72d0c74b653104de85e5a18c508f316e48311040336ece796c2794f9578b4056a982a5c8d5377c9161754fba1c25db6679faf6c68ee324cc4983a1a7d7573a9e80bc251d2ebb3800115c379a70c28dc35957dc3b9d5d8587d369720a581255e1afd2391d0f99a5effb2d64668307af68295ba1e5b9052ba454f6ccefc5c31d4f7e7d0a807caafdad4b66af2fb471d91cbb62af7caa07f98b3d70ad887764538e6bbec7f6839dcdaf7f502e51b81c25a8e7860089b5f28061dbac1960d29d4ff4b9e98812b59e321b6251829221ae3db3e4d4df702ee3fa8fa3d73fb84201123fd8c806de4b22462b5a9aedfd323768960f303c5e8f943de192d1f2aed4ecb61366a24c74d1f11aaebe8ec7345339f70929270b576a2e47a6b387d6ea84ea39723786d9cdd11f0ddebadccfc83ef1176a2", &(0x7f0000000280)=""/183}, 0x18) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000200)={0x6, [0x9, 0x4, 0x1ff, 0xffffffffffffffff, 0x1, 0x3]}, &(0x7f0000000240)=0x10) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200200, 0x0) accept$nfc_llcp(r2, &(0x7f0000000140), &(0x7f0000000340)=0x60) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080)="b1a7e2582146c0f2029e3691e6cb66760e33b4a2cf6c712fb23511dfc09869d3d7314ee95cd09c47c1c3b7a8efdc0754aee8979693f875f7198552f5d10e03b2e43bb1a8e6ab2defa0172738b294f157a58e", 0x0, 0x4}, 0xffffffffffffff8f) 09:12:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 09:12:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000000)=""/116) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x005\x00', @ifru_settings={0xa07000, 0x0, @raw_hdlc=0x0}}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x8, 0x42) 09:12:20 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r0 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') 09:12:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8902, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:20 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r0 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) 09:12:20 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) connect$l2tp(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x2, 0x4, 0x0, {0xa, 0x4e24, 0xfcd9, @loopback, 0x4}}}, 0x3a) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000040)="69fedfa24d9c3e00ed9790aa87df3c9c6242ab0dde606eb8e7b3d71654cf003a729070f160ad06ee09254383ed6e18690f0b9b4040df9517da9097057248849c6bdd4564e9966ad1be46c1720cb99226210f1b432164424734a6afaa020244a6e5ef83ea93d53d0863536375d84ad8b198976d34ce3c2975564a73d20ff5fc30e3f0160e0127024df84ef1778a108b81fbff71ca607187dbf55a94c7fefb36d5d29f4c657886a9543887a7e7b1581f1330229d390fd87ed735076d7e3062", 0x0, 0x2}, 0x20) 09:12:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(0x0, 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8041, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) lstat(0x0, &(0x7f0000000500)) getgid() fstat(0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00@\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x9) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, &(0x7f0000000840)) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, &(0x7f00000008c0)) 09:12:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8995, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 483.076053] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.082606] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.159678] device bridge0 left promiscuous mode 09:12:20 executing program 0: r0 = socket$inet6(0xa, 0x80000, 0x402) setsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000040), 0x4) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x9, 0x4) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/3, 0x3}], 0x1) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x5, @mcast1, 0x6}, 0x1c) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x88000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100)=0x8, 0x4) [ 483.528255] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.534694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.541466] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.547867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.556815] device bridge0 entered promiscuous mode [ 483.567247] bridge0: port 2(bridge_slave_1) entered disabled state 09:12:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, 0x0, 0xfffffffffffffff9) 09:12:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r2, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x32b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x4) clock_gettime(0x1, &(0x7f0000000040)) mq_getsetattr(r1, &(0x7f0000000180)={0x200, 0x401, 0x9, 0x10001, 0x9, 0x7fff, 0x4, 0x8}, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x2}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={r3, @in={{0x2, 0x4e22, @rand_addr=0x7ff}}, 0x7ff, 0x5, 0x9, 0x2, 0x10}, 0x98) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0c000000e6f7ffff39300979ad9393e11d2468b62e0c172e5c"], 0x48c000) r1 = socket(0xa, 0x3, 0x8) keyctl$set_reqkey_keyring(0xe, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x10080) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0x1a}}, 0x10) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) r4 = open(&(0x7f0000000380)='./file0\x00', 0x81, 0x1) ioctl$KVM_SMI(r2, 0xaeb7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000580)=@assoc_value={0x0}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={r5, 0xfffffffffffffff9, 0x40000000000022, 0x6, 0x11100000000000, 0x5}, 0x14) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x145000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000200)={0x1f, 0x8, 0xd02b}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0xc5, "dedd20864b34112c457bba293b7cd1cf7b9eeaa87c78c88d07480e07efa0d3006be9960d122894c7c622c89f66d0df4f9c3fd10802bc2658b10f7aae439d467fd793bc7d9e00dc5dfb700aa30c28c2bd0d7124627419a98f8f06efbe4cf031ab383b877a949371796c4ab6526f66c0d2d046241f105d06d389af8b613b4590b5ed8d14fb8be294f0ec2a4727fd653937a2ce70a3b8e1dbd9529471161a12249ae951a06d195bebd08e4a7d5548024a8d5a594dbc3bfb0ace907e22bd1558c8b0c231f86511"}, &(0x7f0000000240)=0xcd) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f00000002c0)={r7, 0x7ff}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_G_AUDIO(r4, 0x80345621, &(0x7f00000003c0)) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f00000001c0)={0x8, 0x7}, 0x2) 09:12:20 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r0 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 483.573776] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.596584] device bridge0 left promiscuous mode 09:12:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000080)="fca159d33bec64513b9724f3ba29c519f76c6aad510d6fb30f73a2e518c4d1b5034f3ea6b18f321687585b1eb7716fef61757a603b669aa7b314e5649db904442d8b4f761b8371f0ef670bcdd8a3e923cbac64beb3f82d5019d78c2599d6") fcntl$getflags(r0, 0x40b) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0xbd) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0x3c, 0x0, 0xffffffff, 0x1, r0, 0x1}, 0x2c) 09:12:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="7228d94a050f8087e78a14351f92cc247414e047eaeeb2e7a993ed3688c525134a989cb416", 0x25, 0x3}], 0x400, &(0x7f0000000180)={[{@noquota='noquota'}, {@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0x35c1}}, {@quota='quota'}, {@usrquota='usrquota'}, {@errors_continue='errors=continue'}, {@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0x6}}, {@noquota='noquota'}, {@nointegrity='nointegrity'}], [{@seclabel='seclabel'}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0xffffffffffffffff, 0x3, 0x4000000005, 0x0, 0xffffffffffffffff, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 483.859473] jfs: Unrecognized mount option "seclabel" or missing value 09:12:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x1f, 0x1000, &(0x7f0000000440)="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"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080)="db095da184603dab5b1e17e7a7d14ed0b9429db303414bac3c57b98aa5ce0dd9fe863f5d29fe1d337ee86068ac73ade424d0635cfa8abddd1ec0221d6216dd8035377a9b4febbbce67d649feffffff3b075d12b9265433", 0x0, 0x1}, 0xfffffffffffffe96) [ 484.117981] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.124541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.131297] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.137730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.144868] device bridge0 entered promiscuous mode [ 484.156091] bridge0: port 2(bridge_slave_1) entered disabled state 09:12:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(0x0, 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = dup(r0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)=0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xa}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1f}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x74}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x14}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x78}, 0x1, 0x0, 0x0, 0x24000005}, 0x20000001) [ 484.164731] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.175757] device bridge0 left promiscuous mode [ 484.628819] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.635333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.642113] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.648556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.649417] device bridge0 entered promiscuous mode [ 484.663684] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.670233] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.676865] device bridge0 left promiscuous mode [ 484.877161] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.883658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.890422] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.896808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.903615] device bridge0 entered promiscuous mode 09:12:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8906, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)="3db122b242c1d56f1cb8439f7e88d1431bed5f969bb994ab805036fdfac2546d55d94362ccdfdbed96bc88c8057987659908c7ba052960e863adc7b700b11711994c6bdc15f0a39d1d5ad82ad2f760aeb1ac00c1ac7d7920975f350ba34998de4dc56b3571da11d447d72fae14548d20c68ed3aa92406329f18e5b185512ec9160df4d0f3207247c1a17c4b2c2b54b86aee10efdbb2501dda27c", 0x0, 0xffffffffffffffff}, 0x20) 09:12:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r0 = socket(0xa, 0x3, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 484.922472] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.930262] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.958727] device bridge0 left promiscuous mode 09:12:22 executing program 2 (fault-call:8 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 485.324011] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.330551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.337168] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.343635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.350319] device bridge0 entered promiscuous mode [ 485.357132] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.363682] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.372068] device bridge0 left promiscuous mode [ 485.581261] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.587760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.594490] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.600953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.607735] device bridge0 entered promiscuous mode [ 485.619600] bridge0: port 2(bridge_slave_1) entered disabled state 09:12:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0c000000e6f7ffff39300979ad9393e11d2468b62e0c172e5c"], 0x48c000) r1 = socket(0xa, 0x3, 0x8) keyctl$set_reqkey_keyring(0xe, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x10080) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0x1a}}, 0x10) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) r4 = open(&(0x7f0000000380)='./file0\x00', 0x81, 0x1) ioctl$KVM_SMI(r2, 0xaeb7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000580)=@assoc_value={0x0}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={r5, 0xfffffffffffffff9, 0x40000000000022, 0x6, 0x11100000000000, 0x5}, 0x14) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x145000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000200)={0x1f, 0x8, 0xd02b}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0xc5, "dedd20864b34112c457bba293b7cd1cf7b9eeaa87c78c88d07480e07efa0d3006be9960d122894c7c622c89f66d0df4f9c3fd10802bc2658b10f7aae439d467fd793bc7d9e00dc5dfb700aa30c28c2bd0d7124627419a98f8f06efbe4cf031ab383b877a949371796c4ab6526f66c0d2d046241f105d06d389af8b613b4590b5ed8d14fb8be294f0ec2a4727fd653937a2ce70a3b8e1dbd9529471161a12249ae951a06d195bebd08e4a7d5548024a8d5a594dbc3bfb0ace907e22bd1558c8b0c231f86511"}, &(0x7f0000000240)=0xcd) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f00000002c0)={r7, 0x7ff}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_G_AUDIO(r4, 0x80345621, &(0x7f00000003c0)) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f00000001c0)={0x8, 0x7}, 0x2) 09:12:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x1, 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000040)="613a952aa1ab574c0a9cfe17a2b66ded57cb75fe4c70db06da072302e88a47fe66ca4aff3fc826932c5381e23cf049896f1193a5a0c8223ac9df1bf96c4e67da8339ae3bb1da0f1623277636a9500cdee5a8a438eb22ff9c8fc3b6c0e6b470fef00168d70b7941d35028c47daa6493ecbe49222bb2f81448232d3671a4173630e18de25818da3b152728141b0f7c8ef0d75a88097733110a6715a0b88c68be1261cbfa36e9127fbe0dfa5000e6530097a817b54892197e10c88981f6e4f7146f821a03727992643efeb2a73cceedcbfa9b0a51af", &(0x7f0000000140)=""/35}, 0x18) 09:12:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(0x0, 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 485.626831] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.679337] device bridge0 left promiscuous mode 09:12:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = socket(0x15, 0x5, 0x6) r2 = msgget(0x1, 0x180) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/68) r3 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x101000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f00000001c0)=0x2) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000280)) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x111, 0x70bd27, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:23 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl(r0, 0x0, &(0x7f0000000240)="83640fcb37789d2b4fcb0a387580f2188da87fd467358e0cae96f407f3bf8e1637c77f2da17537c4873a63dadb64156600d6f81c7e37b4dbf7d5f9b7f1d7aa7f13c0cf9a7c809c949d5deb8c77e5e66942fd50ceaa5b2f5cd720654fac6a21a4651d043629815fc25986b90536bfd11724bc8a040b948dca47fd2623ab32f30a93d44c411720cde4") ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000100)=r1) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0xfff, 0x2000) fchownat(r4, &(0x7f0000000200)='./file0\x00', r2, r3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) ptrace$getsig(0x4202, r1, 0x2, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 486.174174] FAULT_INJECTION: forcing a failure. [ 486.174174] name failslab, interval 1, probability 0, space 0, times 0 [ 486.185591] CPU: 1 PID: 18249 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #160 [ 486.192957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.202311] Call Trace: [ 486.204900] dump_stack+0x244/0x39d [ 486.208552] ? dump_stack_print_info.cold.1+0x20/0x20 [ 486.213772] should_fail.cold.4+0xa/0x17 [ 486.217838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.223382] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 486.228482] ? trace_hardirqs_off+0xb8/0x310 [ 486.232922] ? kasan_check_read+0x11/0x20 [ 486.237090] ? do_raw_spin_unlock+0xa7/0x330 [ 486.241506] ? trace_hardirqs_on+0x310/0x310 [ 486.245919] ? __bpf_trace_timer_expire_entry+0x30/0x30 [ 486.251287] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 486.256393] ? add_timer+0x62e/0x15a0 [ 486.260256] ? write_all_supers.cold.56+0x106/0x228 [ 486.265276] ? mod_timer+0x1560/0x1560 [ 486.269173] ? debug_object_init_on_stack+0x20/0x20 [ 486.274197] ? dev_change_xdp_fd+0x450/0x450 [ 486.278609] ? del_timer+0xf9/0x150 [ 486.282248] ? mod_delayed_work_on+0x99/0x260 [ 486.286787] ? detach_if_pending+0x6a0/0x6a0 [ 486.291213] ? print_usage_bug+0xc0/0xc0 [ 486.295292] __should_failslab+0x124/0x180 [ 486.299519] should_failslab+0x9/0x14 [ 486.303321] kmem_cache_alloc_trace+0x4b/0x750 [ 486.307892] ? worker_thread+0x1390/0x1390 [ 486.312161] ? __local_bh_enable_ip+0x160/0x260 [ 486.316832] switchdev_port_attr_set+0x14f/0x3e0 [ 486.321598] ? switchdev_port_attr_set_deferred+0x110/0x110 [ 486.327302] ? mod_delayed_work_on+0x1c5/0x260 [ 486.331888] ? mod_delayed_work_on+0x1c5/0x260 [ 486.336515] ? lockdep_hardirqs_on+0x296/0x5b0 [ 486.341141] br_set_state+0x1d9/0x2d0 [ 486.344970] ? br_designated_port_selection+0x6a0/0x6a0 [ 486.350340] ? mod_delayed_work_on+0x182/0x260 [ 486.354926] br_init_port+0xc5/0x260 [ 486.358627] br_stp_enable_port+0x15/0x50 [ 486.362765] br_stp_enable_bridge+0x1ab/0x2c0 [ 486.367253] br_dev_open+0x53/0x70 [ 486.370780] ? br_dev_stop+0x70/0x70 [ 486.374489] __dev_open+0x26d/0x410 [ 486.378127] ? dev_set_rx_mode+0x40/0x40 [ 486.382204] ? __local_bh_enable_ip+0x160/0x260 [ 486.386875] __dev_change_flags+0x730/0x9b0 [ 486.391195] ? dev_set_allmulti+0x30/0x30 [ 486.395336] ? find_held_lock+0x36/0x1c0 [ 486.399394] ? dev_load+0xb0/0x210 [ 486.402925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.408468] dev_change_flags+0x89/0x150 [ 486.412534] dev_ifsioc+0x7d6/0xa80 [ 486.416205] ? register_gifconf+0x70/0x70 [ 486.420386] dev_ioctl+0x1b5/0xcc0 [ 486.423955] sock_do_ioctl+0x1f6/0x420 [ 486.427854] ? compat_ifr_data_ioctl+0x170/0x170 [ 486.432618] ? check_preemption_disabled+0x48/0x280 [ 486.437637] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 486.442570] ? kasan_check_read+0x11/0x20 [ 486.446708] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 486.451996] ? rcu_softirq_qs+0x20/0x20 [ 486.455992] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 486.461180] sock_ioctl+0x313/0x690 [ 486.464808] ? dlci_ioctl_set+0x40/0x40 [ 486.468805] ? ksys_dup3+0x680/0x680 [ 486.472557] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 486.477500] ? dlci_ioctl_set+0x40/0x40 [ 486.481481] do_vfs_ioctl+0x1de/0x1790 [ 486.485385] ? ioctl_preallocate+0x300/0x300 [ 486.489798] ? memset+0x31/0x40 [ 486.493088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.498651] ? smack_file_ioctl+0x210/0x3c0 [ 486.502978] ? fget_raw+0x20/0x20 [ 486.506449] ? smack_file_lock+0x2e0/0x2e0 [ 486.510733] ? fput+0x130/0x1a0 [ 486.514017] ? do_syscall_64+0x9a/0x820 [ 486.517996] ? do_syscall_64+0x9a/0x820 [ 486.521981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.527540] ? security_file_ioctl+0x94/0xc0 [ 486.531957] ksys_ioctl+0xa9/0xd0 [ 486.535424] __x64_sys_ioctl+0x73/0xb0 [ 486.539319] do_syscall_64+0x1b9/0x820 [ 486.543213] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 486.548582] ? syscall_return_slowpath+0x5e0/0x5e0 [ 486.553531] ? trace_hardirqs_on_caller+0x310/0x310 [ 486.558550] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 486.563572] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 486.570243] ? __switch_to_asm+0x40/0x70 [ 486.574303] ? __switch_to_asm+0x34/0x70 [ 486.578387] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.583247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.588442] RIP: 0033:0x457669 [ 486.591640] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.610540] RSP: 002b:00007fa606362c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 486.618249] RAX: ffffffffffffffda RBX: 00007fa606362c90 RCX: 0000000000457669 [ 486.625518] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000006 [ 486.632786] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 486.640056] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6063636d4 [ 486.647328] R13: 00000000004c277c R14: 00000000004d4758 R15: 0000000000000008 [ 486.654727] bridge0: error setting offload STP state on port 2(bridge_slave_1) [ 486.662192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.668921] bridge0: port 1(bridge_slave_0) entered blocking state 09:12:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8982, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:23 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0xdd, 0x20000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xa, 0x2, 0x80000000914, 0x4000000005, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) write$FUSE_POLL(r0, &(0x7f00000002c0)={0x18, 0x0, 0x7, {0x400}}, 0x18) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xff, 0x420700) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000240)={{0x7, @name="59a53ce77669422e02fe7348362e1e5898a7cfca52c2bf59f388d82da002fc10"}, 0x8, 0x72, 0x5}) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080), 0x2) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xf) getsockopt$netlink(r2, 0x10e, 0x8, &(0x7f0000000100)=""/231, &(0x7f0000000200)=0x94) poll(&(0x7f00000000c0)=[{r1, 0x1}, {r2, 0x20}], 0x2, 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x101100, 0x0) [ 486.675288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 486.683922] device bridge0 entered promiscuous mode [ 486.691723] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.698177] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 486.743651] device bridge0 left promiscuous mode [ 487.063630] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.070416] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.076953] device bridge0 left promiscuous mode [ 487.270888] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.277457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 487.284207] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.290626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 487.297387] device bridge0 entered promiscuous mode [ 487.303993] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.310503] bridge0: port 2(bridge_slave_1) entered forwarding state 09:12:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7}) open_by_handle_at(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0c000000e6f7ffff39300979ad9393e11d2468b62e0c172e5c"], 0x48c000) r1 = socket(0xa, 0x3, 0x8) keyctl$set_reqkey_keyring(0xe, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0xf40, 0x10080) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0x1a}}, 0x10) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) r4 = open(&(0x7f0000000380)='./file0\x00', 0x81, 0x1) ioctl$KVM_SMI(r2, 0xaeb7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000580)=@assoc_value={0x0}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={r5, 0xfffffffffffffff9, 0x40000000000022, 0x6, 0x11100000000000, 0x5}, 0x14) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x145000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000200)={0x1f, 0x8, 0xd02b}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0xc5, "dedd20864b34112c457bba293b7cd1cf7b9eeaa87c78c88d07480e07efa0d3006be9960d122894c7c622c89f66d0df4f9c3fd10802bc2658b10f7aae439d467fd793bc7d9e00dc5dfb700aa30c28c2bd0d7124627419a98f8f06efbe4cf031ab383b877a949371796c4ab6526f66c0d2d046241f105d06d389af8b613b4590b5ed8d14fb8be294f0ec2a4727fd653937a2ce70a3b8e1dbd9529471161a12249ae951a06d195bebd08e4a7d5548024a8d5a594dbc3bfb0ace907e22bd1558c8b0c231f86511"}, &(0x7f0000000240)=0xcd) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f00000002c0)={r7, 0x7ff}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_G_AUDIO(r4, 0x80345621, &(0x7f00000003c0)) setsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f00000001c0)={0x8, 0x7}, 0x2) 09:12:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x0, 0x7, 0x0, "3817d45b43106d31c9ac327fc42c2ae87c8bf65e7343bdd64b567a1796c90f599721f7140c252a84274655aa9a30a75b3bca577aa3e6e8030ef9397e663ab5a952764b8031f664464e7e0286d0c90040"}, 0xd8) write$tun(r1, &(0x7f0000000080)={@val={0x0, 0x889e}, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0xa, @dev={[], 0x1c}, @empty, @random="92fb6db061cc", @dev={0xac, 0x14, 0x14, 0x16}}}, 0x20) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1000, 0x22100) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000240)={0x4, 0x4, 0xfffffffffffffffa, 0x1, 0x9, 0xff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f00000000c0)={{0x3, 0xfffffffffffffffe}, 0x0, 0xe6, 0x7, {0x1c7}, 0xe2d, 0x8}) [ 487.317180] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.323555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 487.330826] device bridge0 entered promiscuous mode [ 487.360999] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.367512] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.385082] device bridge0 left promiscuous mode 09:12:24 executing program 3: r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x4, 0x21010, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xfffffffffffffffe, 0x0) mremap(&(0x7f0000c8a000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000698000/0x3000)=nil) ioctl$VHOST_SET_VRING_KICK(r2, 0x3305, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) fcntl$setownex(r2, 0xf, &(0x7f00000000c0)={0x2, r3}) ftruncate(r1, 0x555) 09:12:24 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) sendfile(r0, r0, &(0x7f0000000140)=0x1, 0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x32, "dc45707964bf35c8eade89c6f59ce034fe3d2d61baf4a1573e8d54e76846d7bbc1e324c17380e236e96a64b4515273dfc8a4"}, &(0x7f00000000c0)=0x3a) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0xfb4f, 0x3, [0xc4da, 0xffffffffffffffff, 0x7]}, 0xe) 09:12:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:24 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xf4002, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000480)={0x100000000, {{0x2, 0x0, @remote}}}, 0x88) [ 487.680544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 487.922623] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.929132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 487.935831] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.942284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 487.949592] device bridge0 entered promiscuous mode [ 487.957670] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.964298] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8994, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = epoll_create(0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) fstat(r1, &(0x7f0000000040)) 09:12:25 executing program 1: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 487.972649] device bridge0 left promiscuous mode 09:12:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8983, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 488.385947] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.392462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.399199] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.405554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.412345] device bridge0 entered promiscuous mode [ 488.420515] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.427075] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:25 executing program 0: r0 = socket$inet6(0xa, 0x4, 0xffffffbffffffffb) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2041, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x7, 0x3, [], &(0x7f0000000080)=0x3}) 09:12:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xf4002, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000480)={0x100000000, {{0x2, 0x0, @remote}}}, 0x88) 09:12:25 executing program 1: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0x101, 0x800, 0x7, 0x0, 0x63fa9b03, 0x0, 0x2, 0x7, 0x4, 0x1f66, 0xbdc, 0x800, 0x0, 0x97, 0x1, 0x6, 0x4, 0x10000, 0x8}) [ 488.435277] device bridge0 left promiscuous mode [ 488.474736] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:12:25 executing program 1: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:25 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x10000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x60, 0x4000000005, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:25 executing program 1: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)=ANY=[@ANYBLOB="020e0000140000000000000000000000050006000080000000000000000000000000000000000000080012000000020000020000000000021f000000000000000000000000000000ac14ffbb000000000000000000eb0000ac1412b60000000000000000000000000005000500008000000a00000000000001fe8000000000000000000000000000ff0000000000000000"], 0xa0}}, 0x0) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="021300000000000000000000000000c84aec36cb95fd3e4981bf1dc79e8dd2b6de208dfdad6c0c044d5fe1516333e873668903691a70316455ea3b1a48c7c3d6b24bebac90ae37f74f0e03e9d9f1d951aac416cb666e61d8f514b3bf39141cc93df9ce4275d524b4cc6fd352ba529fc908aeb344fac7cb2fe42210e0e2eea4c82e3b8075857b20b874463a513bd54611d7a2a580396fee7dcadb7a"], 0x10}}, 0x0) 09:12:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = socket$unix(0x1, 0x3, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffff, 0x882) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r1}) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) 09:12:26 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x10, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x2, 0x2, 0x3, 0xf, 0x1, 0x0, 0xfffffffffffffff0}, @exit, @generic={0x100000001, 0x0, 0x401, 0x1183, 0xca3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b22}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @map={0x18, 0xb, 0x1, 0x0, r0}, @generic={0x5, 0x7c, 0x3, 0x6, 0x400}, @alu={0x0, 0x6, 0xb, 0xf, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x37, &(0x7f0000000100)=""/55, 0x41000, 0x1, [], r1, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000e09000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:12:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8992, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:26 executing program 1: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:26 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sy\x00\x00\x01\x00etries\x00\xd6\xb9\xc1*\xe1\xe4\x94|G\x1c\xe9s\xac\x9d\x85G\xe4~\xfbl\xb6\x97\xdd\xaa\x81\x8d\xa0~b\xea2\xd2\xb6\xfe\xff\xeb\x10\x91\x83\xb8\xd5a\xc6\x8f&\xc9\xdf\xdf\xa2\xa6\x01\x97\xc6*\xdf\x94v+\x80g\xa1p\xc9\x86\xe1\xb4#\x8c\'+\xb1\"T\x0f\xf73I\xf2P\xafo8P\xc5\x80\xca=\x0fi\x88\xff\xcbH\x83\x88q^\x19\xda\xfd0\xeb\x03\x80\xf5\xbc\x8f\xae\x9a\'\xe2\x18!v\x87b\x14\xe5\xfe\v`\\\xac}\xe8\xa1S\x80i\x91FV\x04\xcd\v<&\r(\xe3to\xf4\x80t\x93s\x87i\x00\xcbie)\x15\x0et\x17\xder\xb66\xfc\xbaUJ]\xb6\n\xc7ov\x17\xfa5\xc9LDf\xa3\xd7\x8a\x85,\x1aj\x15\xd1\xc2m\xc0~\xf3\xe8\xce\x99\xc0\xfc\xe4\xe6\xfc\x1c\xe8\x1b\xa5\x04\xbcmBO1\xdd~\x04\x8b\xcc\xbb\'\xf4b\xd9\xc9{\x17\x1b\x19X\xdb\x9b\xbc\xe0\xe2\v07\xfa\x0f\x0e\xa6m\xf8/*\r\xa5|\xd2\xc9\x9c*t\xc4\xc8\xa1\a\x9f\x8cO\xe6\f!\x13+\x04\x1c\x1d\x88@\xb5E\xeb\xe1P\xe4KU\xea\x17\x16\x10\x02^f\xcd\x1dQ\xe3\\\xc8\x87\xfc\xb6O\xc2\\\xfePa\xbc\xb2\xa2\x01\xff\x0f\xd0\x86\x87\xd5HA\xcaR\x00ma\x13\x1fE\xc1\xb1v', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r3, 0x314, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3ff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0x20008000) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000040)={0x1, {r1, r2+30000000}, 0x2, 0xfe4}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)) 09:12:26 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x40000) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000140)=0x80000000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000280)="c72b9b51ed890397da74d52ea34d662548ae3324eae2ece15cb112b202f67fe9b0bc3cfe718cfe6a17ce7790f927848736c8f8c674fbc0f5939c8e5eb6646c2d1642a4320b5dc847cf94744dc034d960c0977b389c1a6d479583c527ef1c18035664698253988e0d1787c18030cdf571095298dd58e5d351ff21691897d2ce78027e247b75ef31791731862a8036838a4af9b8a711b612a5754f8bf31b066aa3da60b3c50fc616fc7b7d10c425ca66f4ede9b36c70eb676316c4eda7d121975ead7c3e699b24856be8aed0b9cb345d4e11fbad", 0x0, 0x2}, 0x20) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0800010400000000", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="67e096b03c322dc52a4d12410d8bfc574685750aa81c1c312cc2f9638f5583696ea8ff997b1de0b509f83afc04ce0884f75d4c12f183ad4b52fc0b3f14e1f0f0aad1cbc046e7447b459eab48b5a897874b2d94105ca7fa5cfe529cdd06d5cfbade955864a97fdd079228a8e4d425cc24ff76c1d0bc5d333676ef983f23407ce2a498708bd5ce64b0b9522bdf1ef9e4245a7e8f9cd69d7bf09b98e7694824e4991e9ada3d2a452eeb56e4c91877bab33c11bb76dac7e1668503ea89ff224e0f394f9b2bcb"], @ANYBLOB="06ff200006000080070000000800000087f48c8acb2969fdd584dadec7d242c3771c17d55a9c169ffbc2423c77be3f8a12d685313f5e590881ba0000b237"]) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, &(0x7f0000000040)="eba15b70a206bfc203a713104d425c642a150e4900a7e814d712ceb3c7fd5f46f0a16807e1dfbb0c433e6b0c2e0c5bf724d5fb9efd9eba4d64af2e245b72b38422436f1b9a7e306b1ebcc98efe900e7d3021f62409eaa99e6b3022d57335a059b3714ac15a853d1a03d104721cc0cb8cabbc53c6dc02fbaf0baf48bb56ca30592588e695da3e"}, 0x10) 09:12:26 executing program 1: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x103000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000100)={0x401, 0x0, 0x3e1, @broadcast, 'ip_vti0\x00'}) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 09:12:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge\xff\xff\a\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:26 executing program 0: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f00000000c0)) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r0, &(0x7f00000007c0), 0x4da0d002771356, 0x0) fcntl$setstatus(r0, 0x4, 0x42c02) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000280)={0xa00000000000000, 0x3000, 0x0, 0x1}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000001000/0x2000)=nil) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x800) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xb6a, 0x10040) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100), 0x4) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000003000/0x2000)=nil) 09:12:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891e, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x100000001, 0x800000, 0x0, 0xffffffffffffffff, 0x80000000000}, 0x2c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_trie\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:26 executing program 1: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x103000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000100)={0x401, 0x0, 0x3e1, @broadcast, 'ip_vti0\x00'}) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 09:12:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000600)="d301a5a38e019d238d3c8115d3ce6ed8cad71dfdba58f18d8b708ce91af2db618a9011a6748e19c88b6d7c23e6fbee11d2dde6c3569fffdd99c9b5e7915d26d9f9bcf05f3b8cebd40a80a192fca97c29ef34e0b7a4615e587fd42bb7291795fcb919fc269898d6dafe9e6fbf05fd53f18ad76abe33f4cf23c0e46c9ef9a5d89544d7ce9136e84ab402378e103d3c", 0x8e) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:26 executing program 5: prctl$PR_MCE_KILL(0x21, 0x1, 0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:26 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, &(0x7f00000014c0)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000140)=""/4096) r1 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001140)={r0, r0}) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) r2 = msgget$private(0x0, 0x2) msgrcv(r2, &(0x7f0000001180)={0x0, ""/188}, 0xc4, 0x1, 0x2800) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x8580) getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 09:12:26 executing program 1: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:27 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x300605, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0xffffff2f, 0x0, @ipv4={[0x6], [], @multicast2}, @mcast2={0xff, 0x3, [0x700000000000000]}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 09:12:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8981, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x2, 0x1, 0x235}) r3 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f00000001c0)=""/247, 0xf7) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000002c0)=""/52) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) connect$bt_l2cap(r2, &(0x7f0000000380)={0x1f, 0x3, {0x761, 0x1, 0xffffffffffffffa8, 0x2b38900, 0x6, 0xdd}, 0xffffffffffffff01, 0x3}, 0xe) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f00000003c0)) fcntl$setlease(r1, 0x400, 0x1) openat$cgroup_procs(r0, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r4, 0x70d, 0x70bd2a, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x4) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x100010, r0, 0x0) getpeername$tipc(r0, &(0x7f0000000580)=@name, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000600)=@assoc_value={0x0}, &(0x7f0000000640)=0x8) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r6, 0x800, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcf3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}]}]}, 0x54}}, 0x800) syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x10001, 0x20000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000880)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000900)={0x16, 0x98, 0xfa00, {&(0x7f0000000840), 0x2, r7, 0x3c, 0x0, @in6={0xa, 0x4e20, 0x5, @remote, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {r7, 0x100000000, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0xb8, @local, 0x8b7c}}}, 0x118) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ashmem\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000bc0)={r5, 0x7fff, 0x30}, 0xc) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000c00)=""/162, &(0x7f0000000cc0)=0xa2) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000d00)={0x5, 0x7f}) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000d40)=0x4) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000dc0)={0x2, &(0x7f0000000d80)=[{}, {}]}) 09:12:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000800}, 0x800) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/20, 0x14) 09:12:27 executing program 1: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x45, 0x2, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x2, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000300), 0x0}, 0x18) 09:12:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000600)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) quotactl(0x9, &(0x7f0000000040)='./file0\x00', r5, &(0x7f0000000780)="e3f171c1f2a503a7e1e6eda6087523aa559615365dbd7dc6a561f751eba77a90f1aa14582a79bc9508c5c034b566973d858757f704998230d419c71b4f6ba8272d0c7d2554e815419c858f560a5fe0ea029e701d46d76d231d07ba2f8366677ec68c810454b6de0b5d141288b88c47c09af42939ffc1658fae2bc7b1b12edfc679accc93789b649918bbcec60987d8375277c46f67d7180b4ea9fd21f22ece7eac1199907584f2") munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:27 executing program 5: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) r1 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000100)=""/175) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$rds(0x15, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x210000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000200)={0x1000, 0xd4de, 0x8001, 0xc3c}, 0x6) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000001c0)={r3, 0x317, 0x7, r4}) dup2(r1, r0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000140)) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1b) 09:12:27 executing program 1: socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:27 executing program 3: r0 = socket(0x10, 0x20000000000003, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001580)={0x1c, 0x1a, 0x201, 0x0, 0x0, {}, [@nested={0x8, 0x0, [@generic="10aa"]}]}, 0x1c}}, 0x0) 09:12:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x2, 0x915, 0x4000000005}, 0xffffffffffffff50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8936, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:27 executing program 1: socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x68, &(0x7f0000000100)=0x4, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:27 executing program 3: prctl$PR_SET_TSC(0x1a, 0x1) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x975, 0x7677575f, 0x3, @stepwise={0xffff, 0x76, 0xe710, 0x8, 0x100000000, 0x17cb}}) 09:12:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:27 executing program 1: socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:12:27 executing program 5: r0 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='!\xff.system\'usermd5sum)\xba%bdev%\x00', 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r2 = dup(r1) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000000)={0x0, 0x7, 0x5, 0x5, 0x9, 0x7, 0x2, 0x94f, 0x7, 0x7, 0x2, 0xf144}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x4) 09:12:27 executing program 3: ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4}) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)='2', 0x1}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80) writev(r0, &(0x7f00000000c0), 0x20000000000003fa) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) 09:12:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffdea, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000001000bac38b7be00113d00048c3522b4335d243f27e8e55ebaa3a3006543ed7127e21cfbc98e669f2a4be2f969708476dc5fa9daf895666dca720fba30c7cf77fb5eb3b4f4a70d58287687d76590297b7426c199f2b50d36eb2218d56f1659ab1f1367690dfd971823f8e37426a01627ab31802156947d4f4a5ec6ba8ca737e524546b6b3bffa17fe962639d5113d996642886dd64376b033e44ef6e2d117d226e21c6a6845ed089d31"], 0x28}}, 0x0) r4 = dup2(r1, r2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, 0x0, &(0x7f0000000240)) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) 09:12:28 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, 0x0) 09:12:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x3, 0x914, 0x7, 0x3, 0xffffffffffffffff, 0x20}, 0x2f4576fd) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180)="9e117ec27b1a1fe361b48f320e96aa13ab48d7dc79d15ed832999a6d9f920bbeff041a2ef13cde6574ac8b17019b9299569fdaf921356d33158452cfd5abcdc0fdd111a4c5b58c43a1ccdfb8be5c95b5601460093b72db1a8b0228575585466724214c7557250fab12ecc0014a3304c222270e07bac7344f050b67378d0e5e930aac0d6b6370d50eca27eaba0ea983e631e1da0bb1d026abe78872e63a17515f026fdaf845317aa2fb0ad77418206cc1a35140f1601ced92ec52a91f5d18a4b26cf24eeff0e6c579bb046fe50d6449302223359c5b91db64576187980d", 0x0, 0x2}, 0x20) 09:12:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x4c, 0x0, &(0x7f0000000200)="74235b68f855eee30999f3a6c5ee678db75e8f15af571159f21733a1f5d06d94a1a7554125adbca154c826cd4536c7e80fd6040d73579f90e8774d49ce0f9ab3537b8aa3b34a5462c62bc1f8"}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) mmap$binder(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000600)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="01634040"], 0x0, 0x0, 0x0}) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000040)={&(0x7f0000000140), 0xfffffffffffffdf3, 0x0, 0x1, 0x0, 0x0, 0x1fefffff}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140013c86c023f6b64f8d0", @ANYRES16=r5, @ANYBLOB="00072da8083e92ccdd6b7a13c300000000fedbdf25148f8ee7ea"], 0x14}}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r4, 0xc040563d, &(0x7f0000000180)={0x1, 0x0, 0x101, 0x1, {0x8000, 0xfffc000000000000, 0x7fff, 0x4}}) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 09:12:28 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @mcast1, 0x80000001}, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x102) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r4 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000180)=""/7) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000004c0), &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x1) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000580)=0x4) r5 = semget$private(0x0, 0x6, 0x220) semctl$IPC_RMID(r5, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0xffffffffffff9223, 0x98003) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f00000005c0)=@xdp, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000040)=""/49, 0x31}], 0x2, &(0x7f0000000740)=""/132, 0x84}, 0x0) ppoll(&(0x7f00000001c0)=[{r6}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') 09:12:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0045878, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:28 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, 0x0) 09:12:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 491.245303] Unknown ioctl -1068978587 [ 491.261962] Unknown ioctl -1068978587 09:12:28 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, 0x0) 09:12:28 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x6, 0x200) fcntl$setpipe(r0, 0x407, 0x7) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f00000000c0)="aa", &(0x7f0000000440)=""/4096}, 0x18) [ 491.342586] binder_alloc: binder_alloc_mmap_handler: 18627 20001000-20004000 already mapped failed -16 [ 491.380022] binder: BINDER_SET_CONTEXT_MGR already set [ 491.401963] binder: 18627:18633 ioctl 40046207 0 returned -16 09:12:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8993, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:28 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) [ 491.447799] binder_alloc: 18627: binder_alloc_buf, no vma [ 491.480631] binder: 18627:18658 got reply transaction with no transaction stack [ 491.510982] binder: 18627:18638 transaction failed 29189/-3, size 0-0 line 2973 [ 491.528774] binder: 18627:18658 transaction failed 29201/-71, size 0-0 line 2741 [ 491.613298] binder: undelivered TRANSACTION_COMPLETE [ 491.626404] binder: undelivered TRANSACTION_ERROR: 29201 [ 491.701995] binder: undelivered TRANSACTION_ERROR: 29189 09:12:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0x241}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000580)={0x0, 0x0, @pic={0x0, 0x2947ea45}}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='schedstat\x00') ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x24) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x2000000000, 0x81, 0x6, 0x0, 0x8, 0xba0000000, 0x1, 0x80000000, 0x5, 0x100000001, 0x5, 0x1, 0x9, 0x3ff, 0x1, 0x3], 0x16000, 0x8004}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000180)={0x5000}) 09:12:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = socket$kcm(0x29, 0x7, 0x0) write$binfmt_elf32(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x8, 0x40, 0x4, 0x81000000, 0x3, 0x6, 0x0, 0x179, 0x38, 0x39c, 0x4c1, 0x0, 0x20, 0x1, 0x7, 0x3f, 0xffffffff}, [{0x0, 0x7a, 0x8, 0x1, 0x1ff, 0x4, 0x56f, 0x3ff}], "282050ad08d44a59f6d526c847725e1faaaa4670f9d8cea0d78c0f9cd46483e1", [[], [], [], [], [], [], [], []]}, 0x878) r2 = semget$private(0x0, 0x2, 0x40) r3 = geteuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r6 = getegid() r7 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff8, 0x40000) getpeername$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000180)={{0x5d9, r3, r4, r5, r6, 0x22, 0x1}, 0x8, 0x0, 0x9}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x8000000002}, 0x2b) 09:12:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'rose0\x00', {0x2, 0x4e21, @empty}}) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:29 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @mcast1, 0x80000001}, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x102) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) r4 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000180)=""/7) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000004c0), &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000480)=0x4) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x1) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000580)=0x4) r5 = semget$private(0x0, 0x6, 0x220) semctl$IPC_RMID(r5, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0xffffffffffff9223, 0x98003) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f00000005c0)=@xdp, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000040)=""/49, 0x31}], 0x2, &(0x7f0000000740)=""/132, 0x84}, 0x0) ppoll(&(0x7f00000001c0)=[{r6}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f00000004c0)='./file0\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') 09:12:29 executing program 1 (fault-call:1 fault-nth:0): r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) 09:12:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8947, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x20000) r2 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = gettid() r6 = geteuid() r7 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)=0x0) getresuid(&(0x7f0000001800), &(0x7f0000001840)=0x0, &(0x7f0000001880)) lstat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000001a80)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbff, 0x20}, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000440)={0x1358, 0x39, 0x14, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x8, 0x0, @ipv4=@remote}, @generic="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", @typed={0x4, 0x11}, @nested={0x128, 0x21, [@generic="207eccb0fa6bf510fca42fb56f4265c1f4affe7bf7e188f60bd90f594154831c240e57fab0a8df15c04385125a7403080c0f84cdd29d7e060bf5f3e382d322dac759e016edd246f1aa72490e9d9da8ce54af6a03321d9d05eae1c9bcbcbdc5165215b3490d1129bb910a8eee696b1f97154d3815603996b8c6e4b81b7c83903b66d9deec5e40c78fe586cff1c95428eb26eef2ac37d02afd9a066f43560ec07a856972961dc90fe482c3ca8e7830f6129ec013cb56bb28a221fe9fb36fa6d1a84b34b2f8499c433aef1d042f9e051e215c130862506a3ed862fe8055faee672e0890d19ea349a81f2cedf7ef2f7c9e3b", @typed={0x14, 0x12, @ipv6=@dev={0xfe, 0x80, [], 0x1c}}, @typed={0x14, 0x26, @str='\'^vmnet0eth0\x00'}, @generic="423a5e48cad52a0abc2bf291"]}, @nested={0x214, 0x59, [@typed={0x8, 0x2, @u32=0xb1}, @generic="62b213485a14c059b4c2acf4748dde7172cb804905bf573178b6fd9add75724b7af6", @generic="9ee4a32537d4dce5deecc12d43aec9931ba7a1d8a0c08701d912bffea82b9b881e3390ece58b030e3020eaa402e5c2c7d67fdd1b0097785d2a18a4ce770fffd40cb7f6a50dfa1d7392e06d8dc8a3cb2289372247f17fc23b2f0e5f01af00e042e47e3ec9ff095bb1ca6d8e459b3655dbe22f0c707675f20d4171b757140183ab8470de146362f8f676db79ebb2c9e7743b0fac7a78e63a7b50d429ec87af68280e7ff4bd8708be6762bb53eddedb77ccc4b83517dc0a9a8a9cb0c75dac191a47eacc19a5ff7223c7b783598619721032411b0fe573604d57f626ad0488201ce86ae58145964a66eedae156889b97a1d1", @typed={0xc, 0x76, @u64=0x2}, @generic="b94725182628b47891bffe695653052be3442200c7338fcf8d8dbe028171c8c124071fb0aee8258d599f5818cbf49b0f1e5b410e5746", @typed={0x8, 0x1f, @u32=0x9729}, @generic="7bc81e8eb040ccbc91d1cd48bac0432b84bb9bff985691358ea8cf37952a942375c5c625e5671b5cc674baa5a2def6baf192fd73cb6a271e2f0a1b335f68212ade6c6f525e8444daba44ea647ed5f816c085bffbae7c575fa432214b3b8bb1913679774bea2662d8cfe02740f139010804a5f6420be30a15d1e3da922be56ceaf4db89295c2c6e143651fa2135d110c71060a2857310613faee056c0bd9f9c50020321f81418ad4234ef"]}]}, 0x1358}], 0x1, &(0x7f0000001980)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0xe0, 0x4000005}, 0x4000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000140)="f81c6e3e2d7c945e2ff532e760f23980a5b7b200b1a830640960d94dc20f3e2a42c1e1b290914b0913a58e5bd6b01a0a500623e508de6fdf033538d17b1485596d29aa1d74d3e3b04ce68d2264608d3aa7a03c7af8a8fd1e1c62a1e2dff5c8d4bf7e677b968d6c78c91d2b71fd30732ffad005e5c197d0fc488f981cbe893ed06f5a55c2aab0d935df2899201b55a004d37052fb4c14357505365c15ae1946e52ce72ef579e8e5d14cff1a65ec1719c432ff46cc7655112018b9fece3d9bfdab0f4ffedc42dfa84ba6d21423dd3a7834dcb475c5033c877386c06769fcb182245d", 0x0, 0x400000400002}, 0x20) setsockopt$packet_int(r1, 0x107, 0x1b, &(0x7f0000001ac0)=0x6, 0x4) 09:12:29 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) 09:12:29 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000100)={0x2, 0x4}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xc8f000, 0x202002) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000080)={0x2, 0x2, [{0x44aa, 0x0, 0x3}, {0x2, 0x0, 0xeb2}]}) 09:12:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:29 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0xc000, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000040)={[], 0x9, 0x1, 0x53, 0x0, 0x101, 0x2000, 0x6000, [], 0x80000000}) 09:12:29 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x10, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xe9, 0x2, 0x2, "d48fb7b776a61dc2dea680461c597e03", "64368bd6321b7c0ee6c0e4d690bba0e4e9778c5471bf9b19e22f46862c6ad011ebfe2e9afbb9a2295202d689ba9d7268cb40bab1aff66a367a4f97ced554e934a99b9638f91603c08277a0d99675299c2afd65a60f61493c291b783ae61f862fa0c42f7a3b3b8a752085baab9dfd2de389f79a174848cdcd337b6744e72b32e626f0b1c293ce3e636fe4ed6dba6c104d7e9b631dec5953eef9c33f8ac836850eac47e257a09baef89c0061a3b8bb0797f7d3d80c59f5f377083f5d04a5fb5cd0df96f0b9c16f9e8c12410673de64067632db043f"}, 0xe9, 0x3) syz_open_pts(r0, 0x8000) ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000180)={0x0, 0xa, 0xb6}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000080)={{0x7, 0x7fffffff, 0x8000, 0x4, 0x2, 0x4}, 0x1}) 09:12:29 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8936, &(0x7f0000000100)={'bridge0\x00'}) 09:12:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x4020940d, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:29 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x2000, 0xa1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x0, r0, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'erspan0\x00', 0x1}, 0x18) 09:12:29 executing program 0: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={0x0, {}, {0x2, 0x0, @remote}, {}, 0x4000000201}) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x20000) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000004c0)={"75b463d18e92fc29adda208b48fae620180b6d5e65c0bfea9afc53f55996967dcf69f023f83292313df612e5aa2a1f2323f05541fcf696394f3dc1bd1e9a7b1783f307afe03c7e4b790fbe46297268cc0b490a3a81f2365ed02698a4e19becd71c541d569df0adfe6eddb286a402388947f6e0521877f037bee963cc3338d8d380667b3d59ff5d294b9200f98af58c72abb9f83e475e8a49de8a69e38df0fc14374e3e7f79659cc29400afb9dcb4585b56b9508afd69826226086fb2d1f5c6c866edf123e10a8cafa29b2231f0aeb5221be7ce8637f6eb5b739e0919ad6253965240c33f973b2dac4000bb7c6daf3821059f3e975ec27afe4a1913777260e24830511b57a902eaccfbfa82c2f8fae9a1845e99409188a9fbc0d414f69d85934c63a17844a1dc71f3cee8f236c67169bd5febd35968e63b2f63fe54150ff4d08a2059bef1493ef790d475f01dd8bd8bb9a6a307410fc7dd0d1d5a54ab9e2d9afaa1a76c160760862aaff6c0c4c2f8f2263bb83643b58a97e1e72cd9969bd10b50d72ffa058d887a65af71012872b2578c9caa2ec78d1d5354596257793b2d28bccd542b7f469026b8a79b9fb840d07f5e020eedeef779fafa30b4ccf4d70f054250795ebfc5590fd12ae407d3a2c9bb69b82866ee6d3a55d5ec48fbd4888f157d9bcbd8416645a46e701755e797a0cae53cea5036389aa197c4f195020fcd6842e73936cb72a0eddf6280f38a88508b7fefe25ca35bf02710952b537935aefc3144bbc22179cb6ef01474e7c557fd614931c9c63133bfe52e4449f327bbcf74f392af75a12d7ac5ac7867f161b1116d6ed0f4e91919d784d2728dd8ec4139ac016d0a7595d30cf08be83ee69da5844eb2050f05d2d6c74b202703ec195b5975c1902bdc2f7647bcd5d8f91183c1bbf42e402c71f6fc24c2c9a3702e20c2edc9db80a3590f040b69cc6318a880eba3fa3306d78fac727deff6de3f4081542ca79bb31f658bdea57869d8e23a71f610984d3930cb7736b690ceba8eb13a0b7b9d3cd03466c0eeca63a068ed4186ca1402c036930a1fa0f18e82f9dafae2d794b502337a69ca9bd45d369774ab71b76829bffc38c33335f40314e8d132c57f4f18f16de0053eaee79fc9abb85c4327ebd018181242fa186427e28f1e8d9528ab93b38af4095d6d606b262fffc660d7f4f17993d147d464a87910c68cdf64c1935a9ebfeb4c931c04a47fcdf54fd1e72ada315f074b061e7c07b15ffd34832339d1b1547e54a7ae48ba1a091a3ab38ac516d4ad64844415b27720d32c0e207891461487ff1eba35f3b4963f938d07de4da7707f87e469d6e1198727b8c347ae859e9cdb73ed970cf8a79fed9f0402794653e353e9631a1676865f95b279d6420160707d33355900b01c3f3fbcb623ec62073ae6fefcf3dd411fbd02c0667cb4f2d1cf"}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$llc(r0, &(0x7f0000000180)="56f3b8102168614396cf8dea64688380bdaa79385af7888c44c62ef8f0a5d58f3bb9d11ad3ce737803bd8c12a78de5d33d686ce4f153a940bcd398f9e4052536f290cf9eda2b41f80ff82f18c402d62e4037d8b2ca9dba755287db91b91668b44c1349811c8ea78344143aaa216e857fe45c1fec2128c4d28d6d1b2547c38c808483027b1ab087669477fe63fc42f583ffb9a9842206b2bfdb5fef88c58ec031e6ff160971193892b9c62724177fcf408a4e15", 0xb3, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0x1c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'sit0\x00', 'eql\x00', 'ifb0\x00', 'eql\x00', @link_local, [], @remote, [], 0x108, 0x108, 0x138, [@physdev={'physdev\x00', 0x48, {{'eql\x00', {}, 'vlan0\x00'}}}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x240) 09:12:29 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000001c0)={{}, 0x2000}) 09:12:29 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000100)={'bridge0\x00'}) 09:12:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@int=0x8, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x33b, 0x7, 0x7, 0x400, 0xffffffffffffffc1, @local}, 0x10) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000180)={{0x1f, 0x401, 0x3, 0x9}, 'syz1\x00', 0x3e}) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) write$binfmt_elf64(r0, &(0x7f0000000780)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x3ff, 0x66c, 0xfffffffffffffff8, 0x1, 0x2, 0x3e, 0x200000000000000, 0x1b, 0x40, 0x3a6, 0x3, 0x31, 0x38, 0x1, 0xffffffff, 0x0, 0xcc3}, [{0x4, 0x6, 0x1000, 0x0, 0x2, 0x80000000, 0x9, 0x8}], "5cdca3", [[], [], [], [], [], [], [], []]}, 0x87b) 09:12:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x800000000000002}, 0x20) fcntl$addseals(r0, 0x409, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x141040, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0xfffffffffffffe00, 0x0}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f00000000c0)={r2}) 09:12:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") fanotify_init(0x40, 0x0) fanotify_init(0x71, 0x2) fanotify_init(0x11, 0x101003) 09:12:30 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8941, &(0x7f0000000100)={'bridge0\x00'}) 09:12:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5450, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='gfs2meta\x00', 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') fcntl$setflags(r0, 0x2, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 09:12:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000003000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000040)="66b9800000c00f326635010000000f30dfb900000f018cc760ba4000ec0fc7a8d65f0fc75a0dbaa10066ed660fe7150fae4baaba2100b80020ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) munlock(&(0x7f0000003000/0x4000)=nil, 0x4000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1e, &(0x7f0000000000)=""/45, &(0x7f00000000c0)=0x2d) 09:12:30 executing program 5: mlockall(0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="c64e00b90a609f4b7c9eaea765d396ce9dec714d4b4dec95", 0x0, 0x2}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/238) inotify_init1(0x800) 09:12:30 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f0000000100)={'bridge0\x00'}) 09:12:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="000700000000fedbd6251400006b"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10d800, 0x0) write$nbd(r1, &(0x7f0000000080)={0x67446698, 0x0, 0x0, 0x2, 0x3, "8a307d5082bae356351b31105f93dc8e6034607f006530fa5ac9a2c87b74542f393160fc79f9e53e9728216471cb44c83f7e74dbb22d6fff8e7b424d5c48e9373dc7d4976edfc51a3797f3b6c4f1b7fd04df2338452b12424b938239e106e55917e0cc5fe2f7f9bc08efe68313a7bbc1433eb4e13f7b37f6d2a48e8119def5ff847e007270b2e29f02652087ca87ae9c00a32b75ef6e55cf769f095677733d5899ba1f1864163c5dc5de132e72da0fc7dd8b5d0ad7f42d6acc56706a"}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:30 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f0000000100)={'bridge0\x00'}) [ 493.482380] overlayfs: filesystem on './file0' not supported as upperdir 09:12:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl(r0, 0x7fff, &(0x7f00000004c0)="d0388e08fe8a1775a75e6052990ed1719f5854f8fad3414daf206780ed39d4d9bce06685d75cfefd9269e03fd812dec8e3d6e822c6712ee001d46b01018a5a224c2b1618866cbce2147cdf92d0de9c67d405dc90fd887a5071e4b58bf9684a563aa7d0458acec8a2989e13c28712fd269f29a7d488ed898417d61e2cd31042de1b48d84d463409ecc97ce41929f994cbee5528b9f43c19ec597dd2d30db54515cda1b12c7b1eac4e1993439002beeb1163f6e291599a739745e183e0dabc82359e4d76a816f29709ed753b90238d4e909526764211db955a1b0dc019ebdece51e0449e950472b80cdf") r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.mems\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000001c0)=':', 0x1, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x80000) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x80000000, 0x100) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000425bd7000ffdbdf25050000000c00060003000000000000000c0002005e070000000000000c00030009000000000000000c000800970b0000000000001400070008000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="0c00030027a82f1fc0358000967150fc75312e1c4129fa6ffc39b3dceb3714370df784781ee8d1bba6fe2a5c1aea74784c7accf66a5a38eb257c68294f538b84bf015504353c3739941c74e966fa1bbbae1cc5fb3b347d79cbfffa9968a39cae8c230087f40c197222eadd8d43ff0f000000000000b7a0bba97132190614db902bbbc6b827bc0fc2a9e4e218ce353a98f3efd8bf4a014b953c1b7e763ea9277a60932dba3e468f3c90c4bd8d1b945ae9fc1760f4898718df5dd2df5b5d523c73cd171358665e87037371fe5c98a7e6e0d0"], 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) 09:12:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000003000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000040)="66b9800000c00f326635010000000f30dfb900000f018cc760ba4000ec0fc7a8d65f0fc75a0dbaa10066ed660fe7150fae4baaba2100b80020ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) munlock(&(0x7f0000003000/0x4000)=nil, 0x4000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1e, &(0x7f0000000000)=""/45, &(0x7f00000000c0)=0x2d) 09:12:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8910, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:30 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, &(0x7f0000000100)={'bridge0\x00'}) 09:12:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = shmget(0x0, 0x1000, 0x10, &(0x7f0000ffb000/0x1000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000440)=""/122) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x20400, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r2 = socket(0xa, 0x3, 0x8) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r3, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a1c9b3184a65d5ac676f94f46b8594a7992ccce82be9b823750456a9e15b65f8ed1410fd21daabaccf572172894d91a1f2", @ANYRES16=r4, @ANYBLOB="000700000000fedbdf2514000000"], 0x14}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x4000) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) getpeername$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000200)=0x1c) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000004c0)="9ccc31917d0f61eb4ba3ac6ce8d13ea005005812b712a8ea61e059cade66d8803128c384fbbf07d1eb18549a853e133cb50c5177290b8244dc8dd56d8c57b7ab634c48c514be4f19def2080091c6e6a6b5", 0x0, 0x2}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x14080, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') set_robust_list(&(0x7f0000000480)={&(0x7f0000000100)={&(0x7f0000000080)}, 0x400, &(0x7f0000000440)={&(0x7f0000000140)}}, 0x18) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000180)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000000}, 0xffffffffffffff91, &(0x7f0000000640)={&(0x7f0000000580)={0x88, r2, 0x901, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10001}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1df5f6b81703f375}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xfdeb}, 0x1, 0x0, 0x0, 0x3fff}, 0x8) epoll_wait(r1, &(0x7f0000000680)=[{}, {}], 0x2, 0x7) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100001}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x150, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1c000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x443e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffff800}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3f, 0xf}}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x40}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000000}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4ec}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x150}, 0x1, 0x0, 0x0, 0x8000}, 0x40) 09:12:31 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f0000000100)={'bridge0\x00'}) 09:12:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000770000f3a4442c71011e15009500000060363ea72af563098b03e900000000"], &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 09:12:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x1, r1, 0x1}) r2 = getpgrp(0x0) syz_open_procfs(r2, &(0x7f0000000080)='net/icmp6\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:31 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, &(0x7f0000000100)={'bridge0\x00'}) 09:12:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20010000008912, &(0x7f0000000080)="dee24991c8") r1 = socket$inet(0x10, 0x3, 0x0) r2 = semget$private(0x0, 0x7, 0x608) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000200)=""/161) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000004f0007031dfffd946fa28300201b0a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 09:12:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) 09:12:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0045878, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = open(&(0x7f0000000040)='./file0\x00', 0x103, 0x40) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000080)={0x31, 0x18, [0x4, 0x4, 0x7, 0x8001, 0xfffffffffffffffa, 0xfff]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000040)={0x0, {0x8, 0x5d3, 0x8, 0x800}}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 494.176296] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 09:12:31 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8902, &(0x7f0000000100)={'bridge0\x00'}) 09:12:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080)=',\b\x00p', 0x0, 0x3}, 0xfffffd47) 09:12:31 executing program 3: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = syz_open_dev$mice(0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x8001) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x800) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040)=0x7d000a00, 0x10000000000443) clone(0x1000000, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) pselect6(0x0, 0x0, &(0x7f00000001c0)={0xfffffffffffffffc, 0x1, 0x5, 0xf0c, 0xffff, 0x95, 0x2, 0x7fff}, &(0x7f0000000200)={0x2, 0x0, 0x100000001, 0x8, 0x9, 0x3, 0x76a, 0x7}, 0x0, &(0x7f0000000300)={0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x11020080}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)={0x64, r6, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x480}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$EXT4_IOC_RESIZE_FS(r5, 0x40086610, &(0x7f0000000100)=0x80000001) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r5, 0xc040564a, &(0x7f0000000040)={0x0, 0x3910, 0x301b, 0xff, 0x3, 0x3, 0xfffb, 0x2}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000480), 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000000)={0x40000000002, 0x4}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)={0x7, 0x44de, 0x2, 0x10000, 0x1, [{0x56, 0x1ff, 0x15}]}) r7 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) 09:12:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x2000000000000c) bind(r0, &(0x7f0000000140)=@nl=@kern={0x10, 0x0, 0x0, 0x400040}, 0x80) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x840, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r1, 0x50, &(0x7f00000000c0)}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 09:12:31 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8982, &(0x7f0000000100)={'bridge0\x00'}) 09:12:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = getpgrp(0xffffffffffffffff) fcntl$setown(r0, 0x8, r1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40280, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0)="401e9baf9d5fb9ebb6eeb09e22caa1dd1675d853e0167a16557cfd0595e24340759ba29332dab269bc5d7c7f0985fa11b59fddb3325a0eab1c74561649a7a4fe", 0x0, 0x2}, 0xffffffffffffff98) ioctl$KDMKTONE(r2, 0x4b30, 0x4) 09:12:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8970, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="00070feaff00fedb052514000000"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:31 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f0000000100)={'bridge0\x00'}) 09:12:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0045878, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:31 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80100, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x80000001}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) 09:12:32 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x894c, &(0x7f0000000100)={'bridge0\x00'}) [ 494.943125] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.949753] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:32 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f0000000100)={'bridge0\x00'}) 09:12:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0)="4999d35eb57bbe64b7851029bb48379347b76a1df03962a9742844708c871f11a2637ea107933c24f6acec3c3bb66484f3a6b6f96c2f84f9cc658d04383a1ddfb2359a311fa55b579b36cf21d156a88829fa1f26c5cb6d12", 0x0, 0x2}, 0xffec) [ 495.044491] device bridge0 left promiscuous mode 09:12:32 executing program 3: mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4) r0 = syz_open_dev$mice(0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x8001) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x800) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040)=0x7d000a00, 0x10000000000443) clone(0x1000000, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) pselect6(0x0, 0x0, &(0x7f00000001c0)={0xfffffffffffffffc, 0x1, 0x5, 0xf0c, 0xffff, 0x95, 0x2, 0x7fff}, &(0x7f0000000200)={0x2, 0x0, 0x100000001, 0x8, 0x9, 0x3, 0x76a, 0x7}, 0x0, &(0x7f0000000300)={0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x11020080}, 0xc, &(0x7f00000002c0)={&(0x7f0000000540)={0x64, r6, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x480}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$EXT4_IOC_RESIZE_FS(r5, 0x40086610, &(0x7f0000000100)=0x80000001) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r5, 0xc040564a, &(0x7f0000000040)={0x0, 0x3910, 0x301b, 0xff, 0x3, 0x3, 0xfffb, 0x2}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000480), 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000000)={0x40000000002, 0x4}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)={0x7, 0x44de, 0x2, 0x10000, 0x1, [{0x56, 0x1ff, 0x15}]}) r7 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) 09:12:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100), 0x0, 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0)="c356a6342ea23339fe2ef1621314f301fa8aae889bc204cbfe48f91d54f370d78e798ed44008f4f881aaec378c23035656c510342b124b5169b237b9fff4aa653d9fb84429f9f41437984476b84499c4863143a8f4fdb8c1d811ab6f230db93989a3b7759a6d01a46043dbde4ec7f2aec7a0468abe689545e4b944f8f4fbe13a924ed6aac7373cff2107d84ebc719ae862e394591e94e283b125daf8f9e5c830ab3ba55afeb05eac390045ab92076e007abf10f50b3a7cdd982ce02e38a05858fd122e1c2d", &(0x7f00000001c0)="3b770a693dba6fd37cd7c7f267ee33ad2422f7d04258ac4bd5a977d177bd8b93ffa486e67017c91b855a1d5b4d72a3a0a9e4d3734e644e054d74d14b0df7972772a9825c9d178d60dc19d3a43ac384777a73ca94f545eea56ab7e82b07a547feddb3e7d6d1874d7e83aaeee4ea8aaf99f6f8c2e00bddb900a5092250e002092a47add679f177b8a6ac7bf1668fe5523cbfe60720f8a0af935d9b815244c5395485ef080e7c19ec9cfee8cb3949ee2bb542e5dd30db276586c5084a24a2298ffbbbf4a24e8d026ab7472ab6a9a85639e0b8a92f7fdbc30419", 0x1}, 0x20) 09:12:32 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0189436, &(0x7f0000000100)={'bridge0\x00'}) 09:12:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0)="377b78f4e30476b601308c54f9dcc1ef4ee32a1cb46b8faad10c23e686cc6bf986c839d3f4ba1a34f65f92263b007d935c5304d2e9de1002046c10d02edea0d9dc68863f6aaa1e0c241d154991389c7e0c538480a729b6cccd001e926d385fb63ee6ac5f2f1c6954de7ebb4bd58489fcf14ee94a42e8857203d300007aa341ca94af25817bf8c35a14c703d17c25d25ec4bf81544ece9689ce9c6b7079fc20e8c474878b4af738e562ef43e50943f18bf8bed1642e960f20fcc8209dab169b9363b81bc9a298e2d97b74e91c1ef119416d13", 0x0, 0x2}, 0xfffffffffffffff9) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x420000, 0x0) timerfd_gettime(r1, &(0x7f0000000080)) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x110) 09:12:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'tunl0\x00', 0xdb02}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000600)={0x8, 0x0, [{0x80000007, 0x0, 0x10001, 0x3, 0x3f}, {0x4000000d, 0x7, 0x426, 0x4, 0x1}, {0x1, 0x6, 0x9, 0xfff, 0x7b62}, {0x80000001, 0x7, 0x3, 0x0, 0x5}, {0x0, 0x8000000, 0x0, 0x1e5, 0x2}, {0xc0000000, 0x8000, 0x9, 0x0, 0x7ff}, {0x40000001, 0x4, 0xfffffffffffffff7, 0x9, 0xffffffff}, {0x8000000f, 0x1f, 0x7fffffff, 0x9043, 0x5}]}) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:32 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f0000000100)={'bridge0\x00'}) 09:12:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x200) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x6, 0x8, 0x6, 0x81, r1}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xb69, 0x2081) socket$nl_generic(0x10, 0x3, 0x10) write$UHID_INPUT(r2, &(0x7f0000001180)={0x8, "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", 0x1000}, 0x106a) 09:12:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x7180072d2a2a993, &(0x7f0000002100)={&(0x7f0000002080)=@ipv4_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}]}, 0x28}}, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x1100}, {r0, 0x4248}, {r0, 0x1}, {r0, 0x2000}], 0x4, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={0x9}, 0x8) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x0, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000040)="5f23910d6106372cc35d486eec8455dee4506b73250471a796f1d8dca5220f28470edf23c46e261d783f18c2a6856c9f19fbde14244866ffc5f4d82b56801d18897307e526cc497caa9b44c8d512526ea4e45bd04cf9cf590e277e6382894677bbc83fe0d1ecbd85030a70a610c03fa743d8cbb8397e733521e8d3b9fbc4ac235b38a3ebd5fe15440bb185ed3fb1ab845d2c4b960efa07163507fb", 0x0, 0x5}, 0x20) 09:12:32 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000280)={0x40000000}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0xec, 0x5, 0x1, 0x0, 0x5, 0x28080, 0xa, 0x7, 0x187, 0xfcc, 0x7, 0x7fffffff, 0x34049953, 0x11, 0xe5, 0xff, 0x3f, 0x81, 0x800, 0x8057, 0x0, 0x2, 0x8001, 0x0, 0x1, 0x7fffffff, 0xd3fb, 0x6, 0x1, 0x7, 0x4, 0x3, 0x5, 0x101, 0x8, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x4000, 0x101, 0x6, 0x9, 0x6, 0x4, 0x5}, r0, 0x10, r3, 0x1) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f00000002c0), &(0x7f0000000300)=0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x4, 0x200002000004, 0x0) getsockname(r4, 0x0, &(0x7f0000000100)) 09:12:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x891d, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:32 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8940, &(0x7f0000000100)={'bridge0\x00'}) 09:12:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x98001, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x1, r3}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', &(0x7f0000000140)='/dev/zero\x00', 0xa, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x400080, 0x0) setsockopt$inet_dccp_int(r5, 0x21, 0x10, &(0x7f0000000080)=0x5, 0x4) ppoll(&(0x7f0000000000)=[{r4}, {r1}], 0x2, 0x0, 0x0, 0x0) 09:12:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x48000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:33 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f0000000100)={'bridge0\x00'}) 09:12:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x200) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x6, 0x8, 0x6, 0x81, r1}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xb69, 0x2081) socket$nl_generic(0x10, 0x3, 0x10) write$UHID_INPUT(r2, &(0x7f0000001180)={0x8, "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", 0x1000}, 0x106a) 09:12:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x813, r0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x4, 0x10000) bind$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0xff, {0x6, 0xfffffffffffffff7, 0x7, 0x7}, 0x1, 0x3}, 0xe) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0x400) write$P9_RSETATTR(r3, &(0x7f0000000180)={0x7, 0x1b, 0x2}, 0x7) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x0, 0x0) 09:12:33 executing program 4: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000002c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) r1 = syz_open_procfs(r0, 0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r2 = socket(0xa, 0x3, 0x8) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="f2b7e75bfe595026ffdac8fc6aff00bd6cfc9fb0eb9d70b8e25bfe85d19ebc83dc7b7aed87a1417a790bd2589e65f6275a22bf2ffd37489a2399aa9d800bd5df02b1a5a92e0c08cb0bbf2aa82971e4ac8c8a2cbe8fa8ac40aa0e8b1c0abf53be2ec00d401c5da86a9f3ec38d5783d4de96929c7e6905779e2a6d62395000000000", @ANYRES16=r4, @ANYBLOB="000700000000fedbdf2514000000"], 0x14}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:33 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x4020940d, &(0x7f0000000100)={'bridge0\x00'}) 09:12:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) fcntl$getown(r0, 0x9) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x11c) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000740)={0x0, 0x0, 0x101, 0x0, {0x80, 0x100000001, 0x0, 0x8000}}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{0x0, @addr=0x9}, 0x8, 0x1, 0xffff}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000580)) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100), 0x0, r1) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000100)={0x0, 0x1, @raw_data=[0x1000, 0x836, 0x7ff, 0x0, 0x9, 0xc2, 0x8, 0x6, 0xffff, 0x8, 0x8, 0x9fc, 0xba9, 0x6, 0x7fff, 0x100000001]}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) ioctl$TIOCCONS(r0, 0x541d) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000180)={'mangle\x00'}, &(0x7f0000000280)=0x54) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000440000005c00000007000000f4766aeb94d9682cf2446bbc12367333416666104ef7b7ce01370000000000000007f9e1600b330ce7f5977fabcf0933b4e68111fee7e9fc7e427c8bf55d626245dd5952bee43ab05a99f6f7610d787612a0078be82756bfcd0fad8f80740000000000000030875906"], &(0x7f00000011c0)=""/4096, 0x81, 0x1000, 0x1}, 0x20) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000002c0)={'\x00', {0x2, 0x4e24, @remote}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000006c0)=0x7) writev(r3, &(0x7f0000000600)=[{&(0x7f0000000000)="bb37e2331ef5f05a975c23bf9d1759720accde3730d71ddfef128b789eba848f0f84", 0x22}, {&(0x7f0000000200)="683d04447bc0f51e05d9efbd41174880daa4ca34116ce8a07cb6f8351ab05d396e7e5dec6007e2218f9d08cd0c419e885bf345b973172a3fe3582c9f3b7116f89b950b07e2ef9e780db0aff9ed6d656bf067e4713714ba9c0d4478f40319d778ff51216aed3411a0e822fef5538f9ad111704407663cc6afa27cd90317b449977cb5ac8048c22ff7c0855f21afeb0fddce483763d5", 0x95}, {&(0x7f00000002c0)="2879d48f69074fee954f6724376001c6bb35a58a50cae7585f4e11d9fa76e8105ce57a0e101f013a4cc524d5bf61b8307b2ef5fa023980c3b96f2642c6b9ea8f30ad4d7cdf17d751f2f0ea1e63e2c74391e41c99ef8578c24f272dfeda8cb339ca357477e82282df24c9894b55f6da1ee7c33c0142fe18ea15a70795e63a8b6610dc4284eec4f0c282824796e5d56d22aef4e229e34a669de8", 0x99}, {&(0x7f0000000380)="5f6710418c8333df0a5fc2e35f9d3d492e61abcfd8344d21a241b3cad951c20e53d8abdb818d6f3f5c9ae9ff9dfeeb952d7b27ce072284305b4ef41c30396295631d1ed09d0c7e58e172909e975853954fefac15", 0x54}, {&(0x7f0000000440)="0da1dff7c7e06ad6467b25d7a06eae47b41bc10431e9847dee3f834403448738208e65855768b62c6299cc9881f3e4ad52465f74a8bdfc0e657ec17f6d862a96161281f17a3bef8e5e7ff4be0229585ad12d8e792b68bfcda3c1857a8ffa4f5571868ad0881fc524200204abb1febd6fabac669de464d4c60e86798c90adc6ae9ea345dca9105e32b17ffabbfbb1ed52f87ee6", 0x93}, {&(0x7f0000000500)="d58f15fe54b2905577e9cd02f301c5002f4d469b3a84445ad0b0190b17685c8d4319d8781f04279aff8dffbd419099003e8c50d4a7ff65536844d19a8ad61b07de963dce49f6b1b5714bb156a41ac4a46733fd01161ba48500589fe1b988639b8d26c39d463eae6ea5da8b9a7ffbeb92dc12c7ac792e906e5c5bcf7eb7d7935deb72b9351a9de5511ea73521802df498cdf6b403f9205248bd7b3b3a65de84a889211a97ab6c81a3f1da01e2e031", 0xae}, {&(0x7f00000005c0)="04", 0x1}], 0x7) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm-control\x00', 0x0, 0x0) r5 = msgget$private(0x0, 0x83) msgsnd(r5, &(0x7f0000000700)={0x2, "6f3434f112382b372aa7e75432ffa9d938d51756cfe8e3e23ea3f3c8e4d945f3b6eb4db028637d16"}, 0x30, 0x800) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000040)="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", 0x0, 0x2}, 0x20) 09:12:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ipv6_route\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000100)=""/229, &(0x7f0000000000)=0xe5) keyctl$setperm(0x5, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) 09:12:33 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5460, &(0x7f0000000100)={'bridge0\x00'}) 09:12:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8946, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000019007f5300fe01b2a4a280930a06000000a8430891b702003900090008000c0006000000190015000400000000006300dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91", 0x55}], 0x1}, 0x0) bind$inet(r1, &(0x7f0000000300)={0x2, 0x4e20, @multicast1}, 0xfffffd9a) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1f}, &(0x7f0000000140)=0x8) openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x8, 0x3, 0x820e, 0x20, 0x1, 0x9, 0x40, 0x7, r2}, &(0x7f0000000200)=0x20) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000000)=0x1bbdbeb, 0x4) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{}, {}]}) sendmmsg$alg(r1, &(0x7f0000000140), 0x6b7, 0x0) 09:12:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000180)="845582e59ef5e96e8872d06c36d14ca79051b20782607996e2130a5ef52d17663e91ac64a34af7f718172572afd3717a8d2d61d240646fcc1e79cfb91a2c21bed4c38baed7a1a6c2ef558b669d8e0e335afc2a688a59030164b52906977357225d14d61c7d23bf25bebdfbd1c2c49c719e0d191909", &(0x7f0000000600)=""/186}, 0x18) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:33 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e0, &(0x7f0000000100)={'bridge0\x00'}) 09:12:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8941, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:33 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5452, &(0x7f0000000100)={'bridge0\x00'}) 09:12:34 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8906, &(0x7f0000000100)={'bridge0\x00'}) 09:12:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) ioctl$RTC_AIE_ON(r2, 0x7001) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:34 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x40, 0x10}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0x40000, 0x0, [0x1, 0x2, 0xffffffff00000000, 0x3, 0x6, 0x1ad, 0x800, 0xf05]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) set_mempolicy(0x0, &(0x7f0000000340)=0x2, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0xbe01, @ipv4={[], [], @loopback}, 0x2}}, 0x1, 0xe7, 0x9, 0x9, 0xa000000000000}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000002c0)={r2, 0x8b4}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0xfffffffffffffffb}, &(0x7f0000000280)=0x8) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000300)=0x9, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000380)=0x6) 09:12:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) fcntl$getown(r0, 0x9) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00', 'syx1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00W1\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x00\x00\"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x11c) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000740)={0x0, 0x0, 0x101, 0x0, {0x80, 0x100000001, 0x0, 0x8000}}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{0x0, @addr=0x9}, 0x8, 0x1, 0xffff}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000580)) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100), 0x0, r1) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000100)={0x0, 0x1, @raw_data=[0x1000, 0x836, 0x7ff, 0x0, 0x9, 0xc2, 0x8, 0x6, 0xffff, 0x8, 0x8, 0x9fc, 0xba9, 0x6, 0x7fff, 0x100000001]}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) ioctl$TIOCCONS(r0, 0x541d) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000180)={'mangle\x00'}, &(0x7f0000000280)=0x54) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000440000005c00000007000000f4766aeb94d9682cf2446bbc12367333416666104ef7b7ce01370000000000000007f9e1600b330ce7f5977fabcf0933b4e68111fee7e9fc7e427c8bf55d626245dd5952bee43ab05a99f6f7610d787612a0078be82756bfcd0fad8f80740000000000000030875906"], &(0x7f00000011c0)=""/4096, 0x81, 0x1000, 0x1}, 0x20) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000002c0)={'\x00', {0x2, 0x4e24, @remote}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000006c0)=0x7) writev(r3, &(0x7f0000000600)=[{&(0x7f0000000000)="bb37e2331ef5f05a975c23bf9d1759720accde3730d71ddfef128b789eba848f0f84", 0x22}, {&(0x7f0000000200)="683d04447bc0f51e05d9efbd41174880daa4ca34116ce8a07cb6f8351ab05d396e7e5dec6007e2218f9d08cd0c419e885bf345b973172a3fe3582c9f3b7116f89b950b07e2ef9e780db0aff9ed6d656bf067e4713714ba9c0d4478f40319d778ff51216aed3411a0e822fef5538f9ad111704407663cc6afa27cd90317b449977cb5ac8048c22ff7c0855f21afeb0fddce483763d5", 0x95}, {&(0x7f00000002c0)="2879d48f69074fee954f6724376001c6bb35a58a50cae7585f4e11d9fa76e8105ce57a0e101f013a4cc524d5bf61b8307b2ef5fa023980c3b96f2642c6b9ea8f30ad4d7cdf17d751f2f0ea1e63e2c74391e41c99ef8578c24f272dfeda8cb339ca357477e82282df24c9894b55f6da1ee7c33c0142fe18ea15a70795e63a8b6610dc4284eec4f0c282824796e5d56d22aef4e229e34a669de8", 0x99}, {&(0x7f0000000380)="5f6710418c8333df0a5fc2e35f9d3d492e61abcfd8344d21a241b3cad951c20e53d8abdb818d6f3f5c9ae9ff9dfeeb952d7b27ce072284305b4ef41c30396295631d1ed09d0c7e58e172909e975853954fefac15", 0x54}, {&(0x7f0000000440)="0da1dff7c7e06ad6467b25d7a06eae47b41bc10431e9847dee3f834403448738208e65855768b62c6299cc9881f3e4ad52465f74a8bdfc0e657ec17f6d862a96161281f17a3bef8e5e7ff4be0229585ad12d8e792b68bfcda3c1857a8ffa4f5571868ad0881fc524200204abb1febd6fabac669de464d4c60e86798c90adc6ae9ea345dca9105e32b17ffabbfbb1ed52f87ee6", 0x93}, {&(0x7f0000000500)="d58f15fe54b2905577e9cd02f301c5002f4d469b3a84445ad0b0190b17685c8d4319d8781f04279aff8dffbd419099003e8c50d4a7ff65536844d19a8ad61b07de963dce49f6b1b5714bb156a41ac4a46733fd01161ba48500589fe1b988639b8d26c39d463eae6ea5da8b9a7ffbeb92dc12c7ac792e906e5c5bcf7eb7d7935deb72b9351a9de5511ea73521802df498cdf6b403f9205248bd7b3b3a65de84a889211a97ab6c81a3f1da01e2e031", 0xae}, {&(0x7f00000005c0)="04", 0x1}], 0x7) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm-control\x00', 0x0, 0x0) r5 = msgget$private(0x0, 0x83) msgsnd(r5, &(0x7f0000000700)={0x2, "6f3434f112382b372aa7e75432ffa9d938d51756cfe8e3e23ea3f3c8e4d945f3b6eb4db028637d16"}, 0x30, 0x800) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000040)="d1ccdbe5446db1a3976696e821e899f7623567184526ab3bacde808785c2633c6544840fdc518e9e925d775677db67d46870c2e44443dc9f9a51032b1d25f24bdb5ec63bd4e147e26f555b955f715c09061198f5d4dd929ff39b5539848bb60d62f3737d031f98be6382dfab8022b8a85e15d28d594cb51bac7098e3c3eee20de477334e968f3131c401390d772b30ae30b63faf123ca3432f90972c1e1b04de56a4a7f3f26c6b4909b871327a9f02803fca90085e6af496d63c538045d6414a0474ed94a59951f4f5030641b4e1b52d034bf5bc3c097fbf8f63ac7c9a310e84b0bc4313146b1440b8674bda45b73a1173f82feabffc245c5aec1e0004c546e3514889704e811a17339dc7427e48ed2199fadc157176edc154f91119210bb634b7dcae700dab5ebe4cfefc7d087921dcfa7594387f2c2977adbb0eaac065060053a5c7088576cdb09c0370d17900a2c83aa9355d49f9dd2bdb338c40aaa437e4a0c9eaba2c8a8e1377176ca1849fe1889e00dc73fc782a2c5cb9", 0x0, 0x2}, 0x20) 09:12:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f000001dfc8)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x10, 0x829, 0x0, 0x0, {0x3}, [@nested={0x18, 0x1, [@typed={0x14, 0x0, @ipv6=@mcast2}]}]}, 0x2c}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x400, 0x40000) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000280)={0x10001, 0x5}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x9, @remote, 0x1ff}}, 0x7f, 0x81, 0x1, 0x8, 0x4}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r3, 0x964, 0x6, 0x4}, &(0x7f0000000200)=0x10) ioctl$KIOCSOUND(r2, 0x4b2f, 0xce0) 09:12:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a3, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:34 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890c, &(0x7f0000000100)={'bridge0\x00'}) [ 497.329094] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 497.452655] netlink: 'syz-executor3': attribute type 1 has an invalid length. 09:12:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) fsetxattr$security_evm(r0, &(0x7f0000000900)='security.evm\x00', &(0x7f0000000940)=@md5={0x1, "fdbc06262184c51b846cd3b575a6c8fd"}, 0x11, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xc1) sendmmsg$nfc_llcp(r1, &(0x7f0000000880)=[{&(0x7f0000000080)={0x27, 0x1, 0x0, 0x3, 0xba, 0x8c8, "9012921d9ce5cdbccb7664eaaf68ade43b6e5e11a5f23343cc93dec8fe394deb87645680e44ac0640599dfa077d5045e15f8b60623c2a6915c470e0320a67c", 0xe}, 0x60, &(0x7f0000000440)=[{&(0x7f0000000100)="af2696d86f4f71557ffdb67b71f325c56f40ba0943581d4fa487d3b463d150c2de0a8e35524ff49e", 0x28}, {&(0x7f0000000140)="f090f9ee80ad10538d4fcc1a39eca3368c537f3bfc1f1d5798abc5389cb43a0b4f35f6d9322c6bca6bbf3c27596547874d42083ad51fbbd0bbe716c9b4f8d8a8f55bb50c29a87240a9d1746bc3521a455bfdd16ddc0b04e820ba2d0b289ff5f25587fdfd332f4134c384472f59ee22f867aaae0fe62dda905ecbfdd30f9903f9d622bf9121a286f9e8fb0f871611303f54d4731467b652095617e68477347f6bf86a5241958c354c98", 0xa9}, {&(0x7f0000000200)="e7e1cc335d9a169ba3847d385d1c09153ca0de105246fab85261d5d9d46996c2a98b86e6d5bc256e82d00e7d0758541341df8ac25537ab9e294af9e2094bee1850c116501bc9cc950343dc1048cc6651f556d372cfadb22a7d921b9f59f6c0a4c1903f1dd0ad4b5c18c19d7d788c7cad363dd6275ea6d93d879115ac7683e84232de8f668e531105ec3f6a520a1bdef93e56f8fb6d1e7c5dca5997d0b367112762ba71b18340d3943ebcbcec935f33d9239e5d6afa2f124d42732e1bee5c236c987369bd5f454403", 0xc8}, {&(0x7f0000000300)="5bf0c26e7841ef292bd56a5525e462b7c2fd4e47209462be76ca000dc41099677d2760097754aa44ca93ac8706afb037875ca9bcca387625da10273f730c542e787313370361fd01c71b8657b20bac1296c1456993a5b8fea61fdbd9a44911d48982be38bbf4cf0deb21218b73974f3dde0d1aea71af26ad478dcb9b964d91f7de1d78aa00be42f5591dafa895943d90c897ac23e6353f173777688c53a253967ab551adc7c78336d17917bb4f7dbf3ec64f7c0f5119745c5656f24101ecad28ed1bc6f43dc22f950bd88279d7752df9749662382e9dc62aac5e3e6f3f", 0xdd}], 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="5800000000002ffaa831e6000016015200000000007d2e54414f104a3b5f796cc5e7d4e9bd796a0e6c5fcbc6c6b395c0fe09491ad8e9c7dd8877776edea42344a03272aa4417fb1900000000000000000000"], 0x58, 0x40}, {&(0x7f0000000500)={0x27, 0x1, 0x0, 0x0, 0x8, 0x9, "72a34d88f2fcba4291f183f56972ca963de0e53c7061be18792ca8b1d4c9de6cfb47cf0bbd8592464fcd250f61bf9436f32ae95993f6f49e61a62f92a6b1e0", 0x2d}, 0x60, &(0x7f0000000780)=[{&(0x7f0000000580)="8a7652f4334a4b1a1176eee5a1c26087144f697d7121dfb5782c6be34b1356524e6a0c8d9e863e1f8b3c451ea38f5131a337b18d02916b4ce68f32390ade44ffd880b1d5a4177d1a523d4241fcb32d857138f9591169ecd1577441c4e3a71d40183b340f8eda4616decc88d6b70db0aa9bee329097b7f2a0810b4149aff6c89faf390d0c045b0bb69a511364f926271dd583e496eb3b6f85dc71e5dabc3a79b68a1f8ff4a5144cf32a6e6d708274ee6a26d8e9cfdab15cd840ce86b566f64e59d4ebc8c0a512b7b181a879b46a3283801aafcbd3c8ef7a9f97a83abea9dfacdceb", 0xe1}, {&(0x7f0000000680)="d7a37d94ae4d321d8f099af912f0a20d479ae5a46270b53db3bfd6d8cb09a3cdf054198551fb51a357bfa290e35291d94be655f82ca737334e34671885ba6e4557166af08a02af291c07082660398b2d19121d8d5c6a4a5f09153f78deeac47d2998defc43c4adaae30a9d87f4329e607d3aacbbab1ad5ee65e3e96d9ca8af62e6650c4068d1299271ab6fa176e9b54ccadd580554a51b05e608262506f24425d298a39fc86f26073decb8f734ba119086dbd039af0ee7759c28c4ee4882e222052a77446da994e8366c13971aec610c22fa559b", 0xd4}], 0x2, &(0x7f00000007c0)={0xa8, 0x113, 0x5, "6339e81dbba306953a4b261721d88dde1ddf1c42b6bbcac3a69d31100cf8911ea978f3341ad20a524dd5a4f819e79ff0fbe20d10ff6ebf9ccee85cd308e8b1b80727abac983dbab340f3982a0540466bb2f163f7660d43f70ce5e8b126854cc45b6f89c73b349c09f54bc8610fc959844db2525d3afc478841706bd52e36c2f820630d3c06e7f0603ffe6abc6f0b849ca58b5abb61db"}, 0xa8, 0x4000}], 0x2, 0x800) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000009c0)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000ac0)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x50, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0xb6}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x99}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x20044000) 09:12:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="01010000", @ANYRES16=r3, @ANYBLOB="db88314f8afebb0920a6225e851b3bcabd5a9e77070004000040b202a7fcd29f9cfab056779ef15037ad9886446bf6fc98d6dc18b95ffa1b626bc1ca067eaf7117c02b49d70c94cd212ec742c18cc8b0ab3ef1b7c292cb33daec729a18d1cab22f5268000000000000007a0900000000000000e87ff4ea0d206cd71e51994db2afee3b44dfb26162300bff55f255"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="15000000443bfb29497f00000000000000040000a80ff4904deba6187490ad47305bc6ad8688dcaa9e223d3b982d917a8deb12d7889241d499e469b26d5ddcfeb7b0d80422"], &(0x7f00000000c0)=0x1d) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r5, 0x1}, &(0x7f00000001c0)=0x8) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) write$FUSE_INIT(r2, &(0x7f00000006c0)={0x50, 0x0, 0x3, {0x7, 0x1c, 0x1, 0x80500, 0x1ad, 0x0, 0x20, 0xb7}}, 0x50) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e23, @loopback}], 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x16}, 0x6, 0x1, 0xff, 0x2, 0x0, 0x6}, 0x20) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='.\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x420000, 0x0) setresgid(r1, r2, r3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2800, 0x0) 09:12:34 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8981, &(0x7f0000000100)={'bridge0\x00'}) 09:12:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x101002) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x200000000000}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x3ff, 0x7f, 0x8203, 0x3, 0x2, 0xfffffffffffffa6d, 0x49, 0x3ff, r2}, 0x20) 09:12:34 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0xfffffda2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc9e9, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) writev(r0, &(0x7f0000000180), 0x1d7) 09:12:34 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5451, &(0x7f0000000100)={'bridge0\x00'}) 09:12:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x25, 0x4102) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000080)) 09:12:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x3ff}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x9, 0x79b952373f3dab02, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) accept4$bt_l2cap(r2, 0x0, &(0x7f0000000080), 0x80000) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/246) 09:12:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x894c, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000040)={0x2, 0x3ff, 0x4ff}) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:35 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x2, &(0x7f0000000100)={'bridge0\x00'}) 09:12:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000040)="54c0a13d4ce0b5c6133749ded6a4c158983264a1e240df2300f52315879ac5cc3f6f65da8491326b01c0a1c8e89773c6becb520eedec8e31ea0bfb826c7620bf492482ebef44cbe491b3976872ff2d335d2ce5ba20a01c7b9ce6756f9a83b69065ca04af19a81a0e7d8d060a7735bb7bd73f27f3fdfebb404e62ca8bcf26e62e065fd043d22e94945075615df4fa98808005fb6935bc3157cd118bed1e411068012f55cc24fc4c731e134d99d7e0f7eb67e1ef592add21ac28da83cee46043f0f00bed5054395c23dbb58c1c3feb90fb7f3bf51e6f5f19160d27a6483c79fed09629b2ec0e5e6d3e53dd251fefb7139f") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:35 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x2003f5, 0x0) pwrite64(r0, 0x0, 0xffffffffffffff2d, 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x101}, 0x28, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) 09:12:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffc00, 0x800) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) mlockall(0x1) sendto$unix(r2, &(0x7f0000000140), 0x14ded905162a6a4b, 0x800000000000, 0x0, 0xab5741d01734b4da) recvmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0x34000}], 0x1}}], 0x4000000000001ab, 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x400) 09:12:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200400) accept$alg(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:35 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8907, &(0x7f0000000100)={'bridge0\x00'}) 09:12:35 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="c400000019000107000000000000000000000000000000000000ffff7f000001000000000000000000000000000000000000000000000a000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000bce7baa30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ebcd67e04e0c71000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000c000800090000000000000000000000000033fc414a48038e90593c23f7809324910be116f4af3cd3b983b7c375dee33058b85faf142b20bc234b377c34ef0eff0f0868fd0a36aee1ca394e3be504c668f47a6a1e049863b3f5693e2e2d99c987c9b18df03f24c4f7599d640e"], 0xc4}}, 0x0) 09:12:35 executing program 4: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xf0, 0x1000}, {0x1, 0x9, 0x800}, {0x2, 0x20, 0x1000}], 0x3, &(0x7f00000000c0)={0x77359400}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x200, 0x0, 0x5}) r2 = socket(0xa, 0x3, 0x8) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r4, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), 0x0, 0x2}, 0xfffffe3f) 09:12:35 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f0000000100)={'bridge0\x00'}) 09:12:35 executing program 3: syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x80000040045010, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB="ff0002000a06ffffb76a4f24623a1f45645588c61be01b7f44cf4a3de349b96b6cf8ec0ec5b8292a67fd18a28e721d5a0efc13eacbef923350e3a37d53b4470de4a2450dfd8b0360a51d1c544943ffe0252a41c2d58a5f58537cd7bf889281f423100fb05f616360b822f41888415b5d36878254472278dc8e793676a395469f7e69fb3847d138f4d872f4905f0dbce2202b37ed6ef3ccdd973c7ae02cb3d4385ab7d617868e21ea0529b307c5539be5e4e98178c38a89fe0db35748770b7a0e661854d6233a6ce71fb2f3e492cfa42183d14c658b52c13a5e862080221a4ed706d4fda897800de32c10147d4e0d1ce31ad8513292b49433cb740efa0cbc880621415641ff5d65b43dde56a15b83909f06e1bc671b973228638f4ad084d52793d7cd83baadd9aa04eff15587e5c55a3b7d6269271129bc368729ccd7166cf230a07ec87de69c52f68a46ade946127a29a0"], 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x1a9) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000200)) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000000)) r1 = semget$private(0x0, 0x0, 0x6ac) semctl$GETZCNT(r1, 0x7, 0xf, &(0x7f0000000100)=""/36) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') 09:12:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) recvmmsg(0xffffffffffffffff, &(0x7f0000001e40)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/202, 0xca}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000240)=""/72, 0x48}, {&(0x7f00000002c0)=""/176, 0xb0}, {&(0x7f0000001440)=""/250, 0xfa}, {&(0x7f0000000380)=""/31, 0x1f}], 0x8, &(0x7f00000015c0)=""/124, 0x7c}, 0x3}, {{&(0x7f0000001640)=@alg, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000016c0)=""/150, 0x96}, {&(0x7f0000001780)=""/217, 0xd9}, {&(0x7f0000001880)=""/102, 0x66}, {&(0x7f00000003c0)=""/47, 0x2f}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/49, 0x31}, {&(0x7f0000001a00)=""/200, 0xc8}, {&(0x7f0000001b00)=""/106, 0x6a}, {&(0x7f0000001b80)=""/31, 0x1f}], 0x9, &(0x7f0000001c80)=""/143, 0x8f}, 0xfffffffffffffc00}, {{&(0x7f0000001d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001dc0)=""/12, 0xc}], 0x1}, 0x10001}], 0x3, 0x20, &(0x7f0000001f00)) bind$tipc(r1, &(0x7f0000001f40)=@id={0x1e, 0x3, 0xe24e0ce3a6fae787, {0x4e22}}, 0x10) 09:12:35 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f0000000100)={'bridge0\x00'}) 09:12:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="ba5d9427b5a88514950d3c02", @ANYRES16=r3, @ANYBLOB="000700000000fedbdf2514000000"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:36 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f00000017c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002b80)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000540)={0x0, 0x6, 0x101000000000000}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={r0, 0xf61}, 0x8) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) socket$kcm(0x29, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, 0x0, &(0x7f0000000080)) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x4, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x3ff, 0x100000001, 0x4f9, 0x9}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000117, 0x0) 09:12:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x2004000000005, 0x0, 0xffffffffffffff9c}, 0x2c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x51, 0xa58, "b3c94314629e27cb8cd4f525ed06691a7447b779c58ca78cdd3ccc377a24de1e6479213411bb5a56ec76986a2db8a2b0e05125a978a33bfcfdef2f725c51416e1a79c1cace7b19bd6b"}, &(0x7f0000000140), 0x400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) pselect6(0x40, &(0x7f0000000180)={0x7, 0x6, 0x5, 0xfb, 0xff3, 0x8000, 0x8, 0x6}, &(0x7f00000001c0)={0x4, 0x0, 0x7, 0x10001, 0x8, 0x7fffffff, 0x8, 0x7}, &(0x7f0000000300)={0x4, 0x8, 0xb0, 0x0, 0xfd5, 0x5, 0xf675, 0x20da}, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000340)={0x1000}, 0x8}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000200)) 09:12:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8940, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:36 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a1, &(0x7f0000000100)={'bridge0\x00'}) 09:12:36 executing program 3: syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x0, 0x1) ioctl$int_in(0xffffffffffffffff, 0x80000040045010, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x1a9) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000200)) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000000)) r1 = semget$private(0x0, 0x0, 0x6ac) semctl$GETZCNT(r1, 0x7, 0xf, &(0x7f0000000100)=""/36) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') 09:12:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x0, 0x800, 0x0, 0x100000000}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:36 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101080) r1 = gettid() getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r1, r2, r3}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) [ 499.308784] device bridge_slave_1 left promiscuous mode [ 499.333497] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.424684] device bridge_slave_0 left promiscuous mode [ 499.439496] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:36 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000000c0)={0x5, @capture={0x1000, 0x1, {0xe, 0xc0000000}, 0x1, 0x200000000000000}}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xa, 0x2, 0x914, 0x4000000005, 0x4}, 0x2c) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) setuid(r3) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000080)={0x1f, 0x4, 0x2, 0xd99, 0x4, 0x7fa}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) dup(r0) 09:12:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x8e, &(0x7f0000000100)="bc4d063c92dbeca5eef837c255a26fd3e28f0562a4ffc9857890a423d1f34e855f232c502016ada6056da3c3e872c578e232a5c8bb31b0bda74f78d4acae3def0848bca9b559a3b7cdf38e0c843277873dc953e7f5af25ac370525d04dddf4ea14591a077748207558169d43b124838a92775add05005fd9759753f75eb9b03e07120864527444570493c2ebee52bbf25c927bdff6c402456b7c", 0x9a) 09:12:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381", 0x7) r2 = accept$alg(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0x5) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r3 = dup3(r2, r0, 0x80000) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000140)={0x3e, 0x7, 0x3b}) r4 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) ioctl(r5, 0xffffffffffffffb7, &(0x7f0000000080)) socket$nl_crypto(0x10, 0x3, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f0000042f70)=[{0x7fff, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x1c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0xf016, 0x298000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$KDSETLED(r4, 0x4b32, 0x4) socket(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000004c0)={0x5c, 0x0, &(0x7f0000000380)=[@reply={0x40406301, {0x4, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000300), &(0x7f0000000340)=[0x58]}}, @decrefs={0x40046307, 0x1}, @clear_death={0x400c630f, 0x2, 0x3}], 0x8c, 0x0, &(0x7f0000000400)="d5a0dbeb1bfc8480eb44449b9de006d00ea5dc5da17b60bd1a8b4efe6d8432024d4fbda85bb3af609cba9ac6bf05a2438569f83fb6fad10adc3bd541cd6372cb7ae965132eb54f46caa39a63a1caa382b784245e7321744c667713ee8d92944999028ebc279848e4e10746e294b7819e38cc7ba278c011740ce177d9615e90b9d992333d4d10e88784bdde87"}) 09:12:36 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8916, &(0x7f0000000100)={'bridge0\x00'}) 09:12:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="6cad0000", @ANYRES16=r3, @ANYBLOB="00030042ac7122c5aeaa93680aa6"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@setneightbl={0x70, 0x43, 0x314, 0x70bd25, 0x25dfdbfd, {0x2}, [@NDTA_PARMS={0x4c, 0x6, [@NDTPA_BASE_REACHABLE_TIME={0xc, 0x4, 0x5}, @NDTPA_ANYCAST_DELAY={0xc, 0xc, 0xffffffffffffff08}, @NDTPA_DELAY_PROBE_TIME={0xc, 0x7, 0x78}, @NDTPA_BASE_REACHABLE_TIME={0xc, 0x4, 0x7982}, @NDTPA_PROXY_DELAY={0xc, 0xd, 0xb6}, @NDTPA_GC_STALETIME={0xc, 0x6, 0x4}]}, @NDTA_THRESH2={0x8, 0x3, 0x1}, @NDTA_THRESH1={0x8, 0x2, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) keyctl$get_security(0x11, r5, &(0x7f0000000780)=""/166, 0xa6) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000600)={0x0, 0x0, [], @bt={0xdee6, 0x4, 0x1, 0x3, 0xff, 0x401, 0x8}}) 09:12:36 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8904, &(0x7f0000000100)={'bridge0\x00'}) 09:12:37 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x8e, &(0x7f0000000100)="bc4d063c92dbeca5eef837c255a26fd3e28f0562a4ffc9857890a423d1f34e855f232c502016ada6056da3c3e872c578e232a5c8bb31b0bda74f78d4acae3def0848bca9b559a3b7cdf38e0c843277873dc953e7f5af25ac370525d04dddf4ea14591a077748207558169d43b124838a92775add05005fd9759753f75eb9b03e07120864527444570493c2ebee52bbf25c927bdff6c402456b7c", 0x9a) 09:12:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x11, r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:37 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f0000000100)={'bridge0\x00'}) 09:12:37 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x8e, &(0x7f0000000100)="bc4d063c92dbeca5eef837c255a26fd3e28f0562a4ffc9857890a423d1f34e855f232c502016ada6056da3c3e872c578e232a5c8bb31b0bda74f78d4acae3def0848bca9b559a3b7cdf38e0c843277873dc953e7f5af25ac370525d04dddf4ea14591a077748207558169d43b124838a92775add05005fd9759753f75eb9b03e07120864527444570493c2ebee52bbf25c927bdff6c402456b7c", 0x9a) 09:12:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381", 0x7) r2 = accept$alg(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0x5) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r3 = dup3(r2, r0, 0x80000) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000140)={0x3e, 0x7, 0x3b}) r4 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) ioctl(r5, 0xffffffffffffffb7, &(0x7f0000000080)) socket$nl_crypto(0x10, 0x3, 0x15) write$sndseq(0xffffffffffffffff, &(0x7f0000042f70)=[{0x7fff, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x1c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0xf016, 0x298000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$KDSETLED(r4, 0x4b32, 0x4) socket(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000004c0)={0x5c, 0x0, &(0x7f0000000380)=[@reply={0x40406301, {0x4, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000300), &(0x7f0000000340)=[0x58]}}, @decrefs={0x40046307, 0x1}, @clear_death={0x400c630f, 0x2, 0x3}], 0x8c, 0x0, &(0x7f0000000400)="d5a0dbeb1bfc8480eb44449b9de006d00ea5dc5da17b60bd1a8b4efe6d8432024d4fbda85bb3af609cba9ac6bf05a2438569f83fb6fad10adc3bd541cd6372cb7ae965132eb54f46caa39a63a1caa382b784245e7321744c667713ee8d92944999028ebc279848e4e10746e294b7819e38cc7ba278c011740ce177d9615e90b9d992333d4d10e88784bdde87"}) 09:12:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000240)="bdeae7c1a28c89e2528a798319d84d538c240fb4761f7c9e352eff412c8be0b855454810d39798652b2c526c4ac82a7ec56ba8fb3f6b181dc2d3e17f10ef2d7863fffffffffffffd610b1a748cbc97950ed8298b453f5ff5941df362735132b9547dff4af15d08ef335dd727ebdf9e03c70c69f1d057d7c21a0a646fb98ed3c3c70f27c3fde8e1d5c220c3fd434ab1c4b7d9532c4343378ea34f7d2bb9718723098c1ffc349c721b90c4eb5ce2c62dd9beca4be4ac004ef751475ba4ff478a801443b448e99eed25f6375b477d06b641328762495ac49ce5eec6f41e0600000000000000ee7cb170416cb69b5efefd2c8c11ad401fbf", 0x0, 0x20002}, 0xfffffffffffffe4e) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x1) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000080)) 09:12:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') sendto$inet6(r0, &(0x7f0000000780)="bf7b9011497c8259e38cdf970e01c8d09fee5ba5b082ea6b75b5e879c2201e670ebeb94748399fdf0807f3f44bf6eafacd34778d7879a69f31b29aeac25ae409bef28ee308c5da3d1fbe856a6c2d8b812809ef60ac1c9b5788f2c24e7891836fc3823122d87a51c33b9ce341cd9d071e110be2229b777af36e2928591381644b7c9c51a97e4bf924b7c0d7ea195ac827d39a6e8450158be4b93f6da173a5c09ece1423309e62beac4e8a2cd1e6c84b3376f74fc1d09fa80093f212a683653726c0cbfcb4abdfdf03f1f75c7a319ceef97911f7b8ae9a2de81fc27276b8b5ee4c17dbabb7fc41030344e3c1483614813c25a2792a24cfe6515012853f5fd998872f7909027086c7410fba473a65c4781b94a72c8f084cc7156f5ea85c43c143c1cb0b3b1fa381b21e3da356cc4ea6e1112071210c4ff67d88391e31d5e48e29f62624eb8b0e556c604bd948269b9dbae0e964f61a71c33528c07814f591b8ff1f690896db9d8ad05bfac5a7ff91e09cd9f26687e9a264ebde465764d3687421194f41e1683fbdc8d8c233d8d2ed7b8b0b1065b4da0f2584fd52ccaae41104aa93fe1949c1b4a3dce6f912ea5ba88837269c654b3b154b5ab0f10100f876c2e6c66f2ed2d70e00477971af6d7bec36820d1d5d21ebcdcc1d7d81e3190f6ed7ef5eb6310ff30396f87d72dbc8a92fde090623c19fe9d76c1d16b3513bf84737c48c467e57355fc95626fb104b3ed4f1bc7782857b3a8939c058cccf70d2324fa9625ca4d0b128e3b8c416e2b5c3919f4d8adccf8cff885ce51acf3eab2dc28dccb4eddfdc0fcc6c16049c1447ed3bf7f17c7841ed74fd5cd301961c413a8bfeb4795b7a754096f31d19b5a01023f65a889e0ec5ad465e88f54610e23e6920b047aa98acaecf234243f4e53a4bb0ca526eef4dc6cf59e1e55dfa8a5c1d9a2cd18549fe9e49bca0ea62a4bcd83617119d85d39ced7af6de50fa65d9bc6062ec2cf8faa8cd8824b6660e954cd443cd957ee0f7d252516d4e89f3b6a39a0980fd5181fea96f06a036c6f1d53e58cd336936fec2f925b660088e7ab1bde07c3c4eef7cd81b47f13e4b96196ba1e02322c1936a3b84953f28d408caea190db7cea30b177d427e39271a683db150284aa26f21482274545d7e4b55cbd88688596d797feb6465878688408c5f29fe9086e24243c9f256660a01deb2bd67162153a7c6d37f20f682445dfbc59de3bbde57a6fe0419482187097d8c5d098c775efd53e53a1b54a949e451c711a733ea67af8d1002c1681cb9b8fdc5a0ca7d12160f303ef34995143852ddaf4e45a8d4d383b937e7b16faef5b8bb80d613221dd1cdc8cf11bdefdb32c91880afabf42a81bcf2438805ea6030b72a88a14454ecb1a8ab42b7973039b4ba902a1761b6e97b6df6fc885d91645e4a16c5bbc444a2e93cdf3714cafddc42e76b03e47574c4a73b25c58515193d66820689a5460a6da1d89ae4a759da6a566d4e281c813c998689a405251935da646a06f438e6be956a38b87a5e7fff548347601444d33eb34f31884c82860e2605705ef55da2137b3989ce1907cf0f70ae9c6aca35d9b87861602799834b01a672bccd97bb1e69b32cb089f6a76676edf139316045211f6e2c218ef232c5f82336486cadac2b76729695711addb6af48f9c88569dca467915a034b28306fc1d601ad50398350dcc4150d0fb7ec610ce923354eae9defc9c22ef4c42358afcbb4897927a176f5bcd769eadda28a329d970effda6dcc96298f386172feb0a7e4f7080d9c758711ec1307159ac781d25b30ad1aeb002760801dd8004e7dbde866eb5639c5bbfd4a4e31240a2851bd80bee7c68b386d983b93dfb06f6e18c59f2c2cbbc3bbd71cd224d7a20786f68624c2a5e105a0cde60e2516639da1ef782078240ae350ef8ff5901f308b8078c85ba1561743bcf40ec944f49f5c4a62844253a5b0d771729420f3c62f300433b1008d80df99d736d56d6e92fdcf20aa3fc9dbcb4b7085872c1da8a8c89a9b0edd972a7faabe89f80dd62906f878d7b4e4cf0d1552faa7372744bb89e502ca1fa75065431b5fa815d7670bba1bbc0c13d1348294f3a1c1acb8296627c081daff3fad591598db403848a9e02487f7fbdf64f24f57500cc57a384aa8409e68a0654746bb1c49e5bdeaba30e6c096c04d8179f18050e8699ac2144a7d52eaa1d05f3aacc399b46fb97467f274cfee174db057a7e1ee9ef014dab1ed2845875cb125aff5d8e0e74bedd239d2bc9f4499030f53188821eff7cb5c912bb00e5342d5b6b976fdbb0b75e7356404b9385b5650058ee29908d91ecd613b1937e5cc3940f1bb5fada912feff8ef4d1b9794fd4352a4de7dbf2eae58e101d9302d8cbb6497f2a3e1d5e12ab85c95b6bd1f7d950e61e94ecbe30f009b4e69b2051638fc792df84f43fbcb2bdc4dd11e0bc1de90d9b4d6aa9f7d800e9f76433411a386ba5b3b479482174cd240207ced79893494e740dc437d08f5e0488ed64be1b76baf812d895133b4820d576a21f9fdc0244ea90d0d5091cbcc9991f403b97f4fccea57839e386daa486371738b1dd0dab46afc4290f05604c12db102f6a24c9debacbbad8e3f53ff0ee785ee171db7c60a7fa5b62cc94ece0ee83c075e426e5c4b4df6085e2af49363bdbf8f3bc1248880ea2bf929e206153f4d131e47fb336de4283a70d864cc95f93128b669dcff8e8543b520590e88b686cced61b6019a85c81d5cabc4e0f8cbcf78bb3741e43aa65756ca6c1a0a2632842639a15bfec8a028359c9af793543d573adfec2b0df14f1bfd9291722d799ef93233059fe04a6ec4ded414d4ef829d671d820ccd1a1d418078c4ff37d55136ce453ab2f24767f602ee45d52a4efb77b4ee7fd96c38dc514ef92adf6a7a3298e42c70d9ee7db28c2050f0a38213b4d381c72aff7a8465210b8dab8496d651acd4648e4d0611805cd2d21ae03d6681bf927521459d94a4851d5b5aa1ecb324c90fcb4f3962b191c1bc9475fa2a888b036c6ab6e7ba5cae67c850161da776300329fd69d0c3d3964332adf02fa3f61b915c3ae4598d7f48224f59034feb5673a6750a7ed3d53c5158044066001fb68c972b45aa010ed1db9edf584e51ed5d7317cb4c3e7459fce51fea84a235f389d5e6f9e2a98ff197824e558d35f5791133d1cf4410e39dbe8c4e12a00cbe576cf80acee93b1242bb87ef6c183178e3429eb14bcffe83e60d47a9fce500b7a329bb32618691c079af66e59b11402f13f631fa88502ce98b715f154dc827131eae760db4b07a51f7ea4f812cfa05c74e118134e2113d6e338c27fbeb56c8e32928fd9e8f2494fb2a7faac4e1ca22e733ba7f779feb0407818f5c10349e88e4031067b6c6573571335071c6105591835abc54579d0e6eca9139ac6b521fd3b44605107866ab70e4fea4be5abe2ee081200a0aecbf1d4ddafbca1d23defaf6817f4f55729e0ae895e19d026bc7aa0692d95e749b7f674d08536d3e16dcc560ac7ce1e0e6d57acb6a358e75760a168ddc17f99f15240cf0e18b250576768ffe1e6a35a72d12f80a7ac09d4d0191c7d055bce0238ed7bc4ae123dd314ffcc8c40669ec0e6e39f6f7406810b3aef0c7412ab1d95c4f689b37edbf325f8f1b37bc47c278238935583c47f77cb06b12e0699940984d6f3fe7b61a323259146ff10edab6d0bef852641dfa7850cdb864a055f0c87a5fcbe3b9e787429275bda3379f4d362f2224660fb470306dd0ab095f7de35e45a94be3473113eee5ec921700f913a70f9fd61ec7fdd94f065ab7f90da47a8aa7b1f4ece4e877067ef1813cd91f2de7a1b99d61e052db7fa05f2a8f39acd334a408554ddd344b47835ebef04da4211b5461e106365f0754f1d4f676f2d31812ace50ad43f5b9f3ddbd1b813fa4621c2339afb4008667e60c35744cf79cfe974ddec2c3781cbdfb711e5515207d7f00c49775ec481cd49c2ff6c10a84b1ab163dcf3d9aa687b513d4d20ae2392fd44a487b05622022b29854170a50c513d2558f659f2dd464bda0673cad31b1f9ec10638a31c486afa08c5ba21b52ca179e21d5581fab840f7f407bffaba9d6557f91a83bcb142758a5136a98800cef366b3436819aa7482f94fe19f832e6330729c91c4436dfc5da9290e2e67099c2cd84735384471f74c26216576f2361eb1e0dd938846412971d012f6a143e35b5fb042e85729497875e7e45acbb083c9181dbff39c6adebc734e67abc9596f1481c0feed7fac0eef64f0e031016d27164aa7291d33254bb655244a33ec269fd7047b662bcd204a089de352487df7364fc60b4f38ca407a271027bd6cb97dad0b589ab15e80d4e6b6018a10b7011648d618e7879344b3c95475c2a0dfb2c33ab4b16f154e339ce45312f3a65e8ab7e7350a7f976b00236cfad7c10c6743856c9aeb755ba129c77ad8935c2dd5f70a1e7de0a7d3ce2bc3bbf1bf915004bb5eeb71ee8019c276c3255c8a6339838628a3487b3b292b76f14f02b0dae0cc920a960eccd9b324ef337345b267db6b5732d70aab078f17e42096d615469e72232f56e664a2b957e34429fb010922b57c5ee71aeaace6721a8b9f593ce628423b66c9e3370b7bf5acd84e15ed973d5d886b70701da5780e7d55cac6dd3e4fe69bb95624bac531c0df3812309edc2ac9357d5368f6326317e56a922a6b7953029798766feca93ff3311f8e476b6b6f30cb687deaaf89a615b071db2d0518df029bf79d4bb9210a34785f97f8a004f07ca16ad7250ae33158d93eecfcc9916469a5cf776104f3e465473c5afeb6b7781e5ca4d76472eb819518788bfc95ed1f2d4207b26998920bb0c1f56e146d00cead3559828e7f3334a182ccf53777b3e87b043b34f475a0942f7579ce954e8ae154877525b5ad8ddffbc80b8bee4fbb3d958d1c6f78848d14e4a9eed8e7ce094e5e7cedcccc4e6dcd4d04a496af75623fcc3d7d2dda719de04e8bc50012427cc7b7c559d9fa55d39d30390ad4abbf06956bc492079d4854eaa052ff4d16ed0ea3c6e8c1c818159858ba0710518410a1c2dc0d18c8b319391aba312ee308124fc42eb32b619e8dac9cdc5e0fcc0195d307388a3a8d0fbbae6725c1bf51402df549e06fb30dd7f2e24e3d69c405ed2cea38eca34141eba0611f0e7923377ad01bd9d260dc1f4d6c442caeb5c1637b166414219bf9a0300f243a027a0f3e9d76a6a410339aedcb51102550648b59d3d71de07160701e33fd8471783e6720183b1e027322fb604f641d0ba442e264a6564ae234d9f410112af93ef9b342d41f3a6d81249fab9a5020585b40a855d098792e1df9bd686fbb5c5830340039f11102bee5c5f4d0c5a905aac9573fdac7b0fd233969c26b68a6c418f88c63bc4087039a61fc9e9baca294d77ccec0e9c5525d8b80c6f64fb83ccadee04c0e311b629d33573f3ae433b3500fab2545c0781fee3a820f857d0ea899f99249b49c25b998c3209f940aaa9aa523bce47b8c863e8e6debd5a9c5e7c89d34a32d757bf4a4c957b37e6a06aa381e0378f4690b5d92e4332e717ae74c0be6ac476dce4418ced685a4ef9a09e44fb9b539ea84452c33a655b93017d0e6a6fc5b54adb00c83f9e8d79a91ec47a519273edd5aa72b53e9a99f87b832aa5c7533488252d0add11b5dce693ed9b16882fcac9e47724f3f6a0c498ad33c420522f23c091d46167a4da947db53533ff6deee80f9b2f1056168c4fb39f9f129d54b5999da4ed10e70063bee87c0dee81106349404c087ff9", 0x1000, 0x8800, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f00000000c0)={0x3, 0x1, [0x0, 0x8, 0x4b3, 0xffff, 0x7, 0x5, 0x1bbf]}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000400)={0x80000, 0xc1a, 0x8, 0xfffffffffffff001}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="00070000709b8c0155680000fedbdf25"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r5, 0x3}, 0x8) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f0000000440)='rxrpc\x00', 0x0, &(0x7f0000000480)='IPVS\x00', 0xfffffffffffffff9) 09:12:37 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc020660b, &(0x7f0000000100)={'bridge0\x00'}) 09:12:37 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x8e, &(0x7f0000000100)="bc4d063c92dbeca5eef837c255a26fd3e28f0562a4ffc9857890a423d1f34e855f232c502016ada6056da3c3e872c578e232a5c8bb31b0bda74f78d4acae3def0848bca9b559a3b7cdf38e0c843277873dc953e7f5af25ac370525d04dddf4ea14591a077748207558169d43b124838a92775add05005fd9759753f75eb9b03e07120864527444570493c2ebee52bbf25c927bdff6c402456b7c", 0x9a) 09:12:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x1000000000002, 0x918, 0x6, 0x40000}, 0xfffffffffffffe24) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x268000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x2}) 09:12:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x2, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:37 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) 09:12:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = geteuid() r2 = getpid() sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0xa3, &(0x7f0000000dc0)=[{&(0x7f0000000040)={0x388, 0x10, 0x0, 0x0, 0x0, "", [@generic="9a59805f550182a98f6085e07517af390304e2a0d8a560a96a8a4a7dfea5388616331ee810063928178f91046c9b8f1a962af59c7bab198a588cbbfc39e3150a4e32aa5d10bd9b0a2efea6199953f45b6a2dca3b579e087019421f155c18471b49e7f96e42d66cacf9bf5b442f77084b903ecd604c0e47", @nested={0x110, 0x4b, [@generic="534a88b546dcdd48c500bec9c31f7defe9b48437127d99bd43b97b5b6100f54516148d0f414255d1d760af556aff0969ed44026082f6f81a2a88099aba138a39fe85c7", @generic="65b65f3b3cb1fd372f71f4bac9edb48838c52c9b64f8b15dc71e24563067b9725174525662636dc403a9604e51a50ebdaa9e2d4044eb053d06f2de41232f5ee71f891753982930328f4818931ec9b7622bcc958c74cc184fc56d1f7b4b5e52ba5761ad42f292c58d8df0", @typed={0x8, 0x66, @uid=r1}, @typed={0x54, 0x7a, @binary="64412ed42230faf264525e42b718ecc00ae25786ea04d64e3efed2fe069747002074704f32c5ec375303053c1de4cc01434065a792a2290fecf82252f9dfb5dfa0e43533b54b1379b43d1aff6a2f019e"}]}, @nested={0x1e4, 0xd, [@typed={0x8, 0x8a, @str='\x00'}, @generic="a3f1fe97f8217d82b9360e91f5317919a23b6e11f59eab734ede55b16a40cf936dc4800ce0171c55c7fffba5b4a3f70819ab5de3eb748d381f92781ccdc168db9a60f9284b455c329e39af91661c2bc93b0b21eb5fee740be78668dfd09560f8a853bd5b40fe63ba", @typed={0x18, 0x7f, @str='*(\xb4keyring\"vboxnet1\x00'}, @generic="121c914482671dcf3f75424fc7d8e7838873ee6206aca056ae2ea66f7bb0594766d408d1179dcc3521929189efe67727e35f7c6991e1c4ffc6acf76665e3d448593d2d54ac75d16ddfd0803dbc97c68a9812adaa859bb21883f93f82e8f6718972d8252e68d61a38f6c142ad6f6a6feccc24e5596cba38ee6a3d9736bb60b27803d450ebbdf23c51f58b05c64d5e567d886033ef0f19f806867dfba39904b5c885d949a2c8d1", @typed={0x8, 0x5, @pid=r2}, @typed={0xc, 0xb, @u64=0x401}, @generic="42187eaa1e8c4b31033b16e7f80ec5fa10a2dd565d481b13b874ba7b3a15b8476c90b4dda64fe1a99038b65f78711ed9da1908d21f256d8b2b69856fd686bb980c484e3ad24b21da3be2b0a862bb45b34942a6190bb2e75a0deb1dff3980df6036b7934378111d37349dac29410239e156f60e62c3863519d4cb3f24b7918b398457521c5ea660728489f43089d1a82edf71c5d48ea634b6771bd6fff4"]}, @nested={0xc, 0x1, [@typed={0x8, 0x49, @pid=r2}]}]}, 0x388}], 0x1}, 0x0) 09:12:37 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8903, &(0x7f0000000100)={'bridge0\x00'}) 09:12:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = memfd_create(&(0x7f0000000040)='keyring[}(\x00', 0x3) r2 = gettid() ioctl$RTC_AIE_ON(r1, 0x7001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0xb, &(0x7f00000000c0)='keyring[}(\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r1, 0x0, 0x11, &(0x7f0000000080)='%trusted\\keyring\x00', r3}, 0x30) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000004940)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000180)=""/83, &(0x7f0000000040)=0x53) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) recvmmsg(r2, &(0x7f00000044c0)=[{{&(0x7f0000000600)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)=""/210, 0xd2}, {&(0x7f0000000680)=""/76, 0x4c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x3, &(0x7f0000000980)=""/4096, 0x1000}, 0x40}, {{&(0x7f0000001980)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000001a00)=""/170, 0xaa}, {&(0x7f0000001ac0)=""/72, 0x48}, {&(0x7f0000001b40)=""/165, 0xa5}, {&(0x7f0000001c00)=""/228, 0xe4}], 0x4, &(0x7f0000001d00)=""/154, 0x9a}, 0x1}, {{&(0x7f0000001dc0)=@ax25, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)=""/47, 0x2f}], 0x1, &(0x7f0000000540)=""/29, 0x1d}, 0x6}, {{&(0x7f0000001e40)=@nfc, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)=""/251, 0xfb}, {&(0x7f0000000700)=""/32, 0x20}], 0x2, &(0x7f0000002000)=""/75, 0x4b}, 0x10001}, {{&(0x7f0000002080)=@can, 0x80, &(0x7f0000002300)=[{&(0x7f0000002100)=""/204, 0xcc}, {&(0x7f0000002200)=""/233, 0xe9}], 0x2, &(0x7f0000002340)=""/175, 0xaf}, 0x7fff}, {{0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000002400)=""/31, 0x1f}], 0x1, &(0x7f0000002480)=""/153, 0x99}, 0x8}, {{&(0x7f0000002540)=@pppol2tpin6, 0x80, &(0x7f0000003780)=[{&(0x7f00000025c0)=""/169, 0xa9}, {&(0x7f0000002680)=""/26, 0x1a}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/184, 0xb8}], 0x4, &(0x7f00000037c0)=""/172, 0xac}, 0x8}, {{&(0x7f0000003880)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003900)=""/74, 0x4a}, {&(0x7f0000003980)=""/58, 0x3a}, {&(0x7f00000039c0)=""/104, 0x68}, {&(0x7f0000003a40)=""/64, 0x40}, {&(0x7f0000003a80)=""/77, 0x4d}, {&(0x7f0000003b00)=""/238, 0xee}], 0x6, &(0x7f0000003c80)=""/227, 0xe3}, 0x5}, {{&(0x7f0000003d80)=@ax25, 0x80, &(0x7f0000003e40)=[{&(0x7f0000003e00)=""/21, 0x15}], 0x1, &(0x7f0000003e80)=""/102, 0x66}, 0x8}, {{&(0x7f0000003f00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004400)=[{0x0}, {&(0x7f0000003f80)=""/194, 0xc2}, {&(0x7f0000004080)=""/247, 0xf7}, {&(0x7f0000004180)=""/24, 0x18}, {&(0x7f00000041c0)=""/204, 0xcc}, {&(0x7f00000042c0)=""/207, 0xcf}, {&(0x7f00000043c0)=""/52, 0x34}], 0x7, &(0x7f0000004480)=""/49, 0x31}, 0xf994}], 0xa, 0x10002, &(0x7f0000004740)={0x77359400}) sendmsg$can_raw(r0, &(0x7f0000004880)={&(0x7f0000004780)={0x1d, r5}, 0x10, &(0x7f0000004840)={&(0x7f00000047c0)=@canfd={{0x4, 0x0, 0x4, 0x4803}, 0x11, 0x2, 0x0, 0x0, "89dab100742b61b1e88a6a2119fd6407092a8406ae6dbeb829cdcf8c75ce35cf9488dbd21904a7ade89a4942e3acd5b6e3a69689c81b832ce6596feacd3c83ad"}, 0x48}}, 0x40080) 09:12:37 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) [ 500.641028] netlink: 540 bytes leftover after parsing attributes in process `syz-executor0'. [ 500.675951] netlink: 540 bytes leftover after parsing attributes in process `syz-executor0'. 09:12:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000080)={0x1, 0x0, {0x8000, 0x2, 0x6, 0x1}}) 09:12:37 executing program 1: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x1) r0 = dup(0xffffffffffffff9c) r1 = geteuid() getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) fchown(r0, r1, r2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000280)={0x3f, 0xb59, 0x0, {0xe, @raw_data="c553b3d7d783b3597b61c4ff1656c0df5a9f1170982fc8c13b0c597eb232bade5708fb399afa7b87910f20ff3dde5c070673a6fe101e3ceca75c520ea4a35052cb00b2a996dcc5b4af5a8b1986f4b7305e3ba19ff7c7638cb3ac56e968cc12943c90eef2caf3fef02a9a8dee2bf48e61272563852d6a1070ad4fc2a846d6fcf957fe77eb9e8deefcfa6366d2a017a101c224f13671bc620dd36dc50c4cc06b585cbaeabae709df49ed8f14024ce4d9b79cc26ed694a850a1efd8ac5fc37138414573d372c20a4269"}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000400)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000440)={0x0, 0x1}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="78000000372e17f5b665a7b032a4c07fb2c562e46a68cf10b783cfb5d418489d10b8f015cd90716a46f1055c3cee92ec0435edfe600ac03e7edef092ba15c49db63fa856a8b17cee2ca212b1fdff24360d7f5df9e56cad481697a8aca64744fbc6bea7b531cea55961998425d15123d13d9f483c14025a6cec8cdcc402eacf3e1c300000000000"], &(0x7f0000000540)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'irlan0\x00', r5}) 09:12:37 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) 09:12:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x3, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x401, 0x0, 0x8, 0x3, 0xffffffffffffffff, 0xfffffffffffffff0}, @map={0x18, 0x2, 0x1, 0x0, r0}], &(0x7f0000000080)='GPL\x00', 0xc0, 0x9, &(0x7f00000000c0)=""/9, 0x41000, 0x1, [], r1, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000540)="bdbf8634bc891c1378586c3f439d425db9478280d0ee569a3c265746fdfcee30be147155d92b899d2e4cda385eaf5942c42d7cc348d4d11a37411c13c2c2aa7453753e49a76a7ddf3cbd2aaba3f85b04a961ed05a71fe99e65787cf4a27c26388e3f216a807b855b3dde679391ece6fb82d5d97ac0d16c3a1f360996f1df871362207177158896845e3c454c00f591005a93ac195196c37abbf24f3c965e6357876778faf3cec61bd086870a2e7d44e5b393835ecda1c216f9e94ea697e290bfc6015513bfe737ccfbe3add472c649a72a58711170eea3f9f897455dec0e9b7243cfb1ee00", 0x0, 0x2}, 0x20) [ 500.874727] ýÿ: renamed from bridge0 09:12:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@buf) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ip6gre0\x00', 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="f253b4432c90591c945b9f661ed962b5fd1db94dd2b536ba118dcb7cca7a601c0d3f8c6bb885714dc2ef629680d01d0d0553837754bd8a05a4b4146cce27097ce3f3cd145b0ac579a9e41580950d1c75bed961fd79e7d4a3887abf73325f26eabf723c978f8f0daff9a81060df0326021a25c78a513dd1444f437af49b90d4ca809d937e051d1af750a605d43ded7518ed34cf18d65eaba9da6e6b4e7265", @ANYRES16=r3, @ANYBLOB="000700000000fedbdf2514000000"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x3}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000002c0)={r5, 0x2}, 0x8) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:38 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:38 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) 09:12:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xe9, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000208}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x8, 0x70bd2d, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c8c4}, 0x40) r2 = socket(0xa, 0x3, 0x8) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000001c0)={{0xaf, @local, 0x4e22, 0x2, 'sed\x00', 0x14, 0x1f, 0x54}, {@loopback, 0x4e22, 0x3, 0x7f, 0xffffffffffffff13, 0xec}}, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) 09:12:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = getuid() r2 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000002c0)=0xe8) r5 = geteuid() getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) r7 = getgid() getgroups(0x1, &(0x7f00000003c0)=[0xffffffffffffffff]) r9 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) getresgid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x5}, [{0x2, 0x3, r1}, {0x2, 0x3, r2}, {0x2, 0x1, r3}, {0x2, 0x2, r4}, {0x2, 0x3, r5}], {0x4, 0x1}, [{0x8, 0x1, r6}, {0x8, 0x2, r7}, {0x8, 0x2, r8}, {0x8, 0x2, r9}, {0x8, 0x4, r10}, {0x8, 0x4, r11}, {0x8, 0x2, r12}], {0x10, 0x1}, {0x20, 0x2}}, 0x84, 0x2) 09:12:38 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, 0xffffffffffffffff, 0x0) 09:12:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc020660b, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:38 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) 09:12:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x0, 0xffffffffffffffff, 0x200}, 0x2c) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x70, 0x2000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000240)={{0x0, @loopback, 0x4e21, 0x1, 'wlc\x00', 0x2c, 0x8001, 0x61}, {@broadcast, 0x4e22, 0x0, 0x6, 0x8b0, 0x4}}, 0x44) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000080)={[], 0x6, 0x6, 0x40, 0x0, 0x6, 0x10002, 0xf000, [], 0x5}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000600)=""/239) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0xf0}, 0x1, 0x0, 0x0, 0x40000}, 0x880) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') getpeername$tipc(r2, &(0x7f00000000c0)=@name, &(0x7f0000000180)=0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000780)=ANY=[@ANYBLOB='+\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000771be2119b0eadf1e4736d9572cfd00000000fedbdf251400df006d605852b688c49f816f1f7fcddf0800b5eb7f416581dca3d909e7e1c720bd6838ea6c4da597d322dcb195e55f24dac8c56bd21724da559f98e3f44b6c229d1641c9e473f5d36f59e60d4eaa0925811bfc7aee87b8a16e8f3c641c2da56837fa13ea7f77cd227547bee4ad81d5e41afc512d6d9b7c52eb021cda7d93116e6d5d0ecc68c409ef3451e069"], 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000200)="4029450ff3440f1157f19142d9d93e6509094d85d04ed9f4c4610dc2900400000089f046f615c8280000") setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0x9d, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000540)=0x8, &(0x7f0000000700)=0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xa) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000040)=0x2bb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:38 executing program 3: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:38 executing program 1: r0 = socket(0xa, 0x3, 0x8) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) socket$inet_smc(0x2b, 0x1, 0x0) 09:12:38 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:38 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x1004002, 0x4) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000100)=""/153) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000200), 0x0, 0x2}, 0x20) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'stack ', '/dev/swradio#\x00'}, 0x14) 09:12:38 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:38 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000040)={'veth1_to_bond\x00', 0x400}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, r1, &(0x7f00000000c0)=@encrypted_update={'update ', 'default', 0x20, 'user:'}, 0x15, 0xfffffffffffffff9) 09:12:38 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:38 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8990, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) fchdir(r0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000440)={0x0, 0x0, 0x2080}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x200) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x420100, 0x0) 09:12:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) accept4$inet(r1, &(0x7f0000000540)={0x2, 0x0, @remote}, &(0x7f0000000680)=0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000480)=@int=0x9a8, 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="000700000000fedbce251400000052be8c60ede16d0d385eae613e0f44c63604e8d9b6df0f2fd972e4ccbcbd2667abbfcda409dac94d42127a3e5ff65d4f3316202925d30323ae866bb87e8afe7f6dd5b27ebe8fefd0a39c51a8ef2ef9b114190c6ac8b2b827"], 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r9, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x0, [0xc001001b], [0xc1]}) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x60400) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2008, &(0x7f00000008c0)=ANY=[@ANYBLOB='index=on,upperdir=./file0,obj_role=-%mime_typewlan1loem0*keyring-@mime_type,obj_role=task\x00,dont_appraise,fowner<', @ANYRESDEC=r5, @ANYBLOB=',measure,uid<', @ANYRESDEC=r10, @ANYBLOB="2c7375626a5f0100653d7278727063002c646f6e745f686173682c6dcf000000006e745f617070726169007b42241a0fd70a1bdca21ba362d1add924e63da0dc46ea01225569ea0b2c69b0ecff38c88b51ea8095b2dd7d9b80fa0965f8bc36fcb92d5df867"]) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x7) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000440)=0x400, 0x4) 09:12:39 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, 0xffffffffffffffff, 0x0) 09:12:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7fff, 0x20600) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x0, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:39 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00', 0x2000000000000000}) syz_read_part_table(0x47, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="cde1ad01a2da6138b336f5197663244954d45792b1b3ead933c6a2a81a37da82c2421ccfa38fab8c6da3077c206e800cd923365bee18ec248c0bce3355719afea987cbb0e4fdfff5b555d634631297283f", 0x51, 0x20}]) 09:12:39 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 09:12:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x0, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:39 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x3, 0x7, 0x10000, 0x3, 0x80000000}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r2 = socket(0xa, 0x3, 0x8) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r4, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000600)="05be3905b98c991b95bf8d457b612915cb8276952969438126eef4a9f08d77dc25a2ce01493e88f1b337411b47b98b62f850615396b86ac8dc416a7661a949761261878721c686af28113f8594c3b835de9a33bf4f2dacdbfc84040ffa14a6c74f60944bba065edb96f9a75c7c344410dbb0874b9d5a550c83c83f1481b72c4ae342590759fe1b27279138a66e36583af81e8ab9a778dcc8014e7a35dd687563589ab417327c76ec9fd5b05c4b5ca626b31a7e83d43a466cb2ea", 0xba, 0xfffffffffffffffc) add_key(0x0, 0x0, 0x0, 0x0, r6) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8921, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:39 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x8) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000440)="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", 0x1000, r2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000080)="0c3ba105f06eff024de855641b671dc65c252cc18fb34272ebdfab807df29b36d79b5ed219c469da6371ade5bbbbf4007144fe182ef74599d62fe82d909dd6f5f3ed718bc1b0048dab72faa6f7d6d8699ec731a987a6dfbcb3f92588dadcc38bc2b9bb11c7c0957f9ddfb0cf3071cb9fecd928462e9de1ed414f7f8df8a1f34e7d5e7a31f6cfccb59740d50c6ed8d247f141d5b91f950b97f5fd784ea56fe36619af9992b17481312403b7318e233e8f5bcbd8a12bbf62f748f5c50c44e4f16c04805f0a39e470e6342bed97", &(0x7f0000000180)=""/204}, 0x18) 09:12:39 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xc0, 0x200) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000040)={0x0, 0x1, 0x3017}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000080)={0x0, 0x9, 0x300b}) 09:12:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0x0, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x2, 0x910, 0x2}, 0xfffffffffffffea0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 09:12:39 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:39 executing program 1: r0 = socket(0xa, 0x3, 0x8) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x40, 0x2000) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='syzkaller1\x00', 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000000)={'vlal0\x00'}) 09:12:39 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) r3 = fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sched_setattr(r3, &(0x7f0000000040)={0x30, 0x1, 0x1, 0x80, 0xfffffffffffffffc, 0x6, 0x7, 0x5}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r4, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f00000000c0)={0x5, 0x80000001, 0x8b8, 0xfff}, 0x10) 09:12:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x3, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/240, 0xf0) 09:12:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89b0, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:39 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x0, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:40 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000100)={'b\x00^4\x83\xff\x01\x00\x00 \x00'}) 09:12:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 09:12:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x800, 0xc7c4d3b29786661f) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180), 0x0, 0x1}, 0x20) 09:12:40 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x0, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x11, r0, 0x0) 09:12:40 executing program 1: socketpair(0xf, 0x7, 0x81, &(0x7f0000000000)={0xffffffffffffffff}) accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0xffffffffffffffd9, 0x800) bind$packet(r0, &(0x7f0000000180)={0x11, 0x19, r1, 0x1, 0x401, 0x6, @remote}, 0x14) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89e1, &(0x7f0000000100)={'bridge0\x00'}) [ 503.273999] ================================================================== [ 503.281789] BUG: KASAN: use-after-free in vb2_mmap+0x668/0x6f0 [ 503.287790] Read of size 8 at addr ffff8881d2033b40 by task syz-executor0/19776 [ 503.295234] [ 503.296889] CPU: 1 PID: 19776 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #160 [ 503.304261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.313620] Call Trace: [ 503.316226] dump_stack+0x244/0x39d [ 503.319882] ? dump_stack_print_info.cold.1+0x20/0x20 [ 503.325142] ? printk+0xa7/0xcf [ 503.328439] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 503.333235] print_address_description.cold.7+0x9/0x1ff [ 503.338617] kasan_report.cold.8+0x242/0x309 [ 503.343039] ? vb2_mmap+0x668/0x6f0 [ 503.346694] __asan_report_load8_noabort+0x14/0x20 [ 503.351640] vb2_mmap+0x668/0x6f0 [ 503.355122] ? vb2_poll+0x1d0/0x1d0 [ 503.358766] vb2_fop_mmap+0x4b/0x70 [ 503.362485] v4l2_mmap+0x153/0x200 [ 503.366052] mmap_region+0xe85/0x1cd0 [ 503.369892] ? __x64_sys_brk+0x8b0/0x8b0 [ 503.373980] ? smack_task_getsecid+0x1e6/0x3c0 [ 503.378589] ? lock_downgrade+0x900/0x900 [ 503.382757] ? check_preemption_disabled+0x48/0x280 [ 503.387791] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 503.392735] ? kasan_check_read+0x11/0x20 [ 503.396899] ? mpx_unmapped_area_check+0xd8/0x108 [ 503.401771] ? arch_get_unmapped_area+0x750/0x750 [ 503.406635] ? lock_acquire+0x1ed/0x520 [ 503.410635] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 503.415664] ? cap_mmap_addr+0x52/0x130 09:12:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r3, 0x700, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r1 = shmget(0x3, 0x2000, 0x808, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000040)=""/26) 09:12:40 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001440)={0x0, 0x9, 0x1, {0xb, @win={{0x0, 0xffff}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffd, 0x10, r0, 0x0) 09:12:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x6, 0xfffffffffffffc01, 0x10000, 0x9, r0, 0x6}, 0x2c) [ 503.419655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.425208] ? security_mmap_addr+0x80/0xa0 [ 503.429559] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 503.435115] ? get_unmapped_area+0x292/0x3b0 [ 503.439545] do_mmap+0xa22/0x1230 [ 503.443019] ? mmap_region+0x1cd0/0x1cd0 [ 503.447098] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 503.451178] ? down_read_killable+0x150/0x150 [ 503.455729] ? security_mmap_file+0x174/0x1b0 [ 503.460241] vm_mmap_pgoff+0x213/0x2c0 [ 503.460271] ? vma_is_stack_for_current+0xd0/0xd0 [ 503.460295] ? _copy_to_user+0xc8/0x110 09:12:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x9, 0x80, 0x9, 0x23, 0x1, 0xffffffffffffffff}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000801, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0, 0x2}, 0x17) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) [ 503.460338] ksys_mmap_pgoff+0x4da/0x660 [ 503.460355] ? do_syscall_64+0x9a/0x820 [ 503.460385] ? find_mergeable_anon_vma+0xd0/0xd0 [ 503.460405] ? trace_hardirqs_on+0xbd/0x310 [ 503.485873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.485892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.485911] ? trace_hardirqs_off_caller+0x310/0x310 [ 503.485936] __x64_sys_mmap+0xe9/0x1b0 [ 503.485960] do_syscall_64+0x1b9/0x820 [ 503.485975] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 503.485998] ? syscall_return_slowpath+0x5e0/0x5e0 [ 503.514079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.514100] ? trace_hardirqs_on_caller+0x310/0x310 [ 503.514120] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 503.514140] ? prepare_exit_to_usermode+0x291/0x3b0 [ 503.514164] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.514189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.514208] RIP: 0033:0x457669 [ 503.539453] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.539462] RSP: 002b:00007fababae9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 503.539479] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 503.539489] RDX: 000ffffffffffffd RSI: 0000000000002000 RDI: 0000000020ffe000 [ 503.539499] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 503.539510] R10: 0000000000000011 R11: 0000000000000246 R12: 00007fababaea6d4 [ 503.539520] R13: 00000000004c2d75 R14: 00000000004d50e8 R15: 00000000ffffffff [ 503.539547] [ 503.539555] Allocated by task 19771: [ 503.539574] save_stack+0x43/0xd0 [ 503.539589] kasan_kmalloc+0xc7/0xe0 [ 503.539603] __kmalloc+0x15b/0x760 [ 503.539619] __vb2_queue_alloc+0xf7/0xfa0 [ 503.539633] vb2_core_create_bufs+0x401/0x8c0 [ 503.539648] vb2_create_bufs+0x4b6/0x8f0 [ 503.539667] vb2_ioctl_create_bufs+0x327/0x4a0 [ 503.554730] v4l_create_bufs+0x152/0x230 [ 503.554760] __video_do_ioctl+0x8b1/0x1050 [ 503.554775] video_usercopy+0x5c1/0x1760 [ 503.554789] video_ioctl2+0x2c/0x33 [ 503.554802] v4l2_ioctl+0x154/0x1b0 [ 503.554816] do_vfs_ioctl+0x1de/0x1790 [ 503.554829] ksys_ioctl+0xa9/0xd0 [ 503.554842] __x64_sys_ioctl+0x73/0xb0 [ 503.554867] do_syscall_64+0x1b9/0x820 [ 503.554886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.576973] [ 503.576982] Freed by task 19764: [ 503.576999] save_stack+0x43/0xd0 [ 503.577015] __kasan_slab_free+0x102/0x150 [ 503.577031] kasan_slab_free+0xe/0x10 [ 503.577045] kfree+0xcf/0x230 [ 503.577060] __vb2_queue_free+0x5e2/0xa30 [ 503.577075] vb2_core_queue_release+0x62/0x80 [ 503.577090] _vb2_fop_release+0x1d2/0x2b0 [ 503.577105] vb2_fop_release+0x77/0xc0 [ 503.577175] vivid_fop_release+0x18e/0x440 [ 503.577194] v4l2_release+0x224/0x3a0 [ 503.633749] __fput+0x385/0xa30 [ 503.633764] ____fput+0x15/0x20 [ 503.633781] task_work_run+0x1e8/0x2a0 [ 503.633798] exit_to_usermode_loop+0x318/0x380 [ 503.633817] do_syscall_64+0x6be/0x820 [ 503.662908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.662914] [ 503.662926] The buggy address belongs to the object at ffff8881d2033b40 [ 503.662926] which belongs to the cache kmalloc-1k of size 1024 [ 503.662941] The buggy address is located 0 bytes inside of [ 503.662941] 1024-byte region [ffff8881d2033b40, ffff8881d2033f40) [ 503.662946] The buggy address belongs to the page: [ 503.662961] page:ffffea0007480c80 count:1 mapcount:0 mapping:ffff8881da800ac0 index:0xffff8881d20324c0 compound_mapcount: 0 [ 503.662979] flags: 0x2fffc0000010200(slab|head) [ 503.663003] raw: 02fffc0000010200 ffffea0006ecdb08 ffffea000746aa88 ffff8881da800ac0 [ 503.674309] raw: ffff8881d20324c0 ffff8881d2032040 0000000100000003 0000000000000000 [ 503.674317] page dumped because: kasan: bad access detected [ 503.674321] [ 503.674333] Memory state around the buggy address: [ 503.837892] ffff8881d2033a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 503.845267] ffff8881d2033a80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 503.852641] >ffff8881d2033b00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 503.860011] ^ [ 503.865481] ffff8881d2033b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 09:12:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x6, 0x401, 0x0, 0x3553800000, 0x7f}) r1 = socket(0xa, 0x3, 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8942, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) fcntl$getown(r2, 0x9) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x700, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}}, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000780)={0x1, 0x3}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) add_key(&(0x7f0000000800)='syzkaller\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffa) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6aaaa4fbf70536d9, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="380bab0bf689e4d2d93c845c129658368acbdde4fef8063d0bfdff07000000000000dfdc557cea752e5941"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xa}, 0x48) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000240)=""/11, &(0x7f0000000280)=0xb) request_key(&(0x7f00000003c0)='rxrpc\x00', 0x0, &(0x7f0000000740)='IPVS\x00', 0xfffffffffffffff9) 09:12:41 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$UI_DEV_CREATE(r0, 0x5501) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x9}, 0x8) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x802, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) semget(0x3, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f256080"], 0x2) close(r1) timer_create(0x0, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, 0x0, 0x0) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89e1, &(0x7f0000000040)={'bridge0\x00'}) 09:12:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) pipe(&(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) [ 503.872863] ffff8881d2033c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 503.880239] ================================================================== [ 503.887600] Disabling lock debugging due to kernel taint [ 503.928629] Kernel panic - not syncing: panic_on_warn set ... [ 503.934582] CPU: 0 PID: 19776 Comm: syz-executor0 Tainted: G B 4.20.0-rc7+ #160 [ 503.943354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.952709] Call Trace: [ 503.955313] dump_stack+0x244/0x39d [ 503.958964] ? dump_stack_print_info.cold.1+0x20/0x20 [ 503.964184] panic+0x2ad/0x55c [ 503.967388] ? add_taint.cold.5+0x16/0x16 [ 503.971554] ? preempt_schedule+0x4d/0x60 [ 503.975716] ? ___preempt_schedule+0x16/0x18 [ 503.980150] ? trace_hardirqs_on+0xb4/0x310 [ 503.984496] kasan_end_report+0x47/0x4f [ 503.988481] kasan_report.cold.8+0x76/0x309 [ 503.992818] ? vb2_mmap+0x668/0x6f0 [ 503.996482] __asan_report_load8_noabort+0x14/0x20 [ 504.001422] vb2_mmap+0x668/0x6f0 [ 504.004904] ? vb2_poll+0x1d0/0x1d0 [ 504.008551] vb2_fop_mmap+0x4b/0x70 [ 504.012221] v4l2_mmap+0x153/0x200 [ 504.015772] mmap_region+0xe85/0x1cd0 [ 504.019594] ? __x64_sys_brk+0x8b0/0x8b0 [ 504.023677] ? smack_task_getsecid+0x1e6/0x3c0 [ 504.028274] ? lock_downgrade+0x900/0x900 [ 504.032447] ? check_preemption_disabled+0x48/0x280 [ 504.037477] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 504.042413] ? kasan_check_read+0x11/0x20 [ 504.046580] ? mpx_unmapped_area_check+0xd8/0x108 [ 504.051453] ? arch_get_unmapped_area+0x750/0x750 [ 504.056305] ? lock_acquire+0x1ed/0x520 [ 504.060334] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 504.065362] ? cap_mmap_addr+0x52/0x130 [ 504.069351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.074904] ? security_mmap_addr+0x80/0xa0 [ 504.079239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.084792] ? get_unmapped_area+0x292/0x3b0 [ 504.089214] do_mmap+0xa22/0x1230 [ 504.092681] ? mmap_region+0x1cd0/0x1cd0 [ 504.096773] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 504.100870] ? down_read_killable+0x150/0x150 [ 504.105379] ? security_mmap_file+0x174/0x1b0 [ 504.109906] vm_mmap_pgoff+0x213/0x2c0 [ 504.113817] ? vma_is_stack_for_current+0xd0/0xd0 [ 504.118686] ? _copy_to_user+0xc8/0x110 [ 504.122681] ksys_mmap_pgoff+0x4da/0x660 [ 504.126777] ? do_syscall_64+0x9a/0x820 [ 504.130779] ? find_mergeable_anon_vma+0xd0/0xd0 [ 504.135548] ? trace_hardirqs_on+0xbd/0x310 [ 504.139888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.145443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.150819] ? trace_hardirqs_off_caller+0x310/0x310 [ 504.155958] __x64_sys_mmap+0xe9/0x1b0 [ 504.159877] do_syscall_64+0x1b9/0x820 [ 504.163785] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 504.169173] ? syscall_return_slowpath+0x5e0/0x5e0 [ 504.174112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.178968] ? trace_hardirqs_on_caller+0x310/0x310 [ 504.184001] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 504.189030] ? prepare_exit_to_usermode+0x291/0x3b0 [ 504.194064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.198938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.204132] RIP: 0033:0x457669 [ 504.207350] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.226263] RSP: 002b:00007fababae9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 504.233981] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457669 [ 504.241257] RDX: 000ffffffffffffd RSI: 0000000000002000 RDI: 0000000020ffe000 [ 504.248532] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 504.255835] R10: 0000000000000011 R11: 0000000000000246 R12: 00007fababaea6d4 [ 504.263132] R13: 00000000004c2d75 R14: 00000000004d50e8 R15: 00000000ffffffff [ 504.271451] Kernel Offset: disabled [ 504.275082] Rebooting in 86400 seconds..