r\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 429.001425] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.007994] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.014679] device bridge0 left promiscuous mode [ 429.178388] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.184976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.191705] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.198132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.204880] device bridge0 entered promiscuous mode [ 429.210896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 429.217581] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.223994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.231193] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.237580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.245471] device bridge0 entered promiscuous mode [ 429.251602] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 429.259520] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.267968] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.276669] device bridge0 left promiscuous mode [ 429.316419] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.322886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.329588] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.335957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.343180] device bridge0 entered promiscuous mode 01:21:11 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:11 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:11 executing program 0: munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mprotect(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x0) 01:21:11 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:11 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xffffff7f}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:11 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 429.416915] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.424141] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.499916] device bridge0 left promiscuous mode 01:21:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 429.705622] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.712241] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.728477] device bridge0 left promiscuous mode 01:21:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 429.912487] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.919150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.925832] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.932253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.966777] device bridge0 entered promiscuous mode [ 429.976896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 429.989583] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.996211] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.002928] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.009337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.028690] device bridge0 entered promiscuous mode [ 430.037483] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 430.049648] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.058186] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.098915] device bridge0 left promiscuous mode [ 430.145760] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.152273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.158949] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.165344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.172808] device bridge0 entered promiscuous mode [ 430.180586] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.187609] bridge0: port 2(bridge_slave_1) entered forwarding state 01:21:12 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:12 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:12 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 430.196327] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.204006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.213884] device bridge0 entered promiscuous mode [ 430.230934] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x7501}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 430.258110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 430.280773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:21:12 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 430.308204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 430.323239] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.329893] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.338261] device bridge0 left promiscuous mode [ 430.568018] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.574686] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.581666] device bridge0 left promiscuous mode [ 430.757784] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.764519] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.771262] device bridge0 left promiscuous mode [ 430.778325] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.784728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.791446] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.797803] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:13 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 430.804553] device bridge0 entered promiscuous mode [ 430.811106] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.817466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.824192] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.830630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.867721] device bridge0 entered promiscuous mode [ 430.877141] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.884292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.893142] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.900688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.909603] device bridge0 entered promiscuous mode 01:21:13 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:13 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:13 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 430.962044] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.969843] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.031332] device bridge0 left promiscuous mode [ 431.082296] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.088863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.095551] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.101974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.109116] device bridge0 entered promiscuous mode 01:21:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x2000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:13 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 431.139168] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.146033] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.174668] device bridge0 left promiscuous mode [ 431.217334] IPVS: ftp: loaded support on port[0] = 21 [ 431.425341] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.431992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.438754] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.445264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.452039] device bridge0 entered promiscuous mode [ 431.458720] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.465528] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:14 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 431.477967] device bridge0 left promiscuous mode [ 431.661639] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.670654] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.679374] device bridge0 left promiscuous mode [ 431.713224] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.719777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.726551] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.732984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.739688] device bridge0 entered promiscuous mode [ 431.746032] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.752454] bridge0: port 2(bridge_slave_1) entered forwarding state 01:21:14 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 431.759076] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.765414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.772244] device bridge0 entered promiscuous mode [ 431.787378] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.795506] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:14 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 431.824359] device bridge0 left promiscuous mode [ 431.863725] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.870293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.877023] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.883459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.893539] device bridge0 entered promiscuous mode 01:21:14 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 431.908018] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.914670] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.930750] device bridge0 left promiscuous mode [ 432.155796] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.162291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.169154] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.175501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.184964] device bridge0 entered promiscuous mode [ 432.195684] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x2}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 432.202177] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.208729] device bridge0 left promiscuous mode 01:21:14 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 432.410731] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.417264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.424136] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.430558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.437248] device bridge0 entered promiscuous mode [ 432.446110] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.454233] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:15 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 432.463017] device bridge0 left promiscuous mode [ 432.521256] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.527915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.534973] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.541406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.548608] device bridge0 entered promiscuous mode [ 432.556568] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.564716] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:15 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 432.573954] device bridge0 left promiscuous mode [ 432.615011] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.621496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.628406] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.634796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.657977] device bridge0 entered promiscuous mode 01:21:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x7501000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 432.678527] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.684982] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.703136] device bridge0 left promiscuous mode [ 432.950613] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.957153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.963882] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.970431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.977099] device bridge0 entered promiscuous mode [ 432.984131] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.990675] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.997236] device bridge0 left promiscuous mode [ 433.194156] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.200719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.207417] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.213844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.220538] device bridge0 entered promiscuous mode [ 433.226129] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 433.242905] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.250796] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.260979] device bridge0 left promiscuous mode [ 433.302366] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.308896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.315528] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.321937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.329002] device bridge0 entered promiscuous mode [ 433.589828] device bridge_slave_1 left promiscuous mode [ 433.595446] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.658877] device bridge_slave_0 left promiscuous mode [ 433.664460] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.719552] team0 (unregistering): Port device team_slave_1 removed [ 433.729960] team0 (unregistering): Port device team_slave_0 removed [ 433.741140] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 433.791876] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 433.858586] bond0 (unregistering): Released all slaves [ 434.216692] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.223363] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.230870] device bridge_slave_0 entered promiscuous mode [ 434.237777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 434.286184] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.293094] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.300777] device bridge_slave_1 entered promiscuous mode [ 434.344575] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 434.389254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 434.524522] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 434.573077] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 434.785253] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 434.793016] team0: Port device team_slave_0 added [ 434.836875] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 434.844340] team0: Port device team_slave_1 added [ 434.888220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 434.937438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 434.982433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 434.990068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.007255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 435.037682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 435.045612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 435.054214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 435.385841] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.392328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.399112] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.405452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.412778] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 436.298004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 436.357571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 436.449456] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 436.542148] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 436.548530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 436.555623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.648028] 8021q: adding VLAN 0 to HW filter on device team0 01:21:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:19 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:19 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:19 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x4000000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:19 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x200000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 437.213837] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.220367] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.251676] device bridge0 left promiscuous mode 01:21:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 437.642584] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.649458] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.656322] device bridge0 left promiscuous mode [ 437.861621] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.868179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.874924] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.881365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.888262] device bridge0 entered promiscuous mode [ 437.894817] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.901337] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.908229] device bridge0 left promiscuous mode [ 437.921219] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.927566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.934281] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.940727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.947500] device bridge0 entered promiscuous mode [ 437.968771] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.975771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.983838] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.991193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.014727] device bridge0 entered promiscuous mode [ 438.027727] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 438.035305] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.041925] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.048881] device bridge0 left promiscuous mode [ 438.060810] bridge0: port 2(bridge_slave_1) entered blocking state 01:21:20 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:20 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x3f00}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:20 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:20 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 438.067341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.074085] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.080494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.087682] device bridge0 entered promiscuous mode 01:21:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf0}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 438.151009] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.158139] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 438.228773] device bridge0 left promiscuous mode 01:21:20 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 438.599748] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.606477] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.613067] device bridge0 left promiscuous mode [ 438.619484] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.626002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.632681] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.639089] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:21 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:21 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:21 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 438.645939] device bridge0 entered promiscuous mode [ 438.653076] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.659955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.667695] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.674636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.688179] device bridge0 entered promiscuous mode 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 438.728194] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 438.771768] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.778396] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.801548] device bridge0 left promiscuous mode 01:21:21 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:21 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x300000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xc]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:21 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:21 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 439.233210] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.239777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.246379] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.252796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.259575] device bridge0 entered promiscuous mode [ 439.266331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:21:21 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf0ffffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:21 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 439.384622] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.391703] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xffffffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 439.425299] device bridge0 left promiscuous mode 01:21:22 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:22 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 439.859159] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.865715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.872464] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.878862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.888652] device bridge0 entered promiscuous mode 01:21:22 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x40000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:22 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x75010000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 440.116534] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.123059] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:22 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 440.162787] device bridge0 left promiscuous mode 01:21:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:22 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:22 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 440.649096] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.655586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.662290] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.668815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.675499] device bridge0 entered promiscuous mode [ 440.687008] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:23 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x0, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:23 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 440.694782] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.706634] device bridge0 left promiscuous mode 01:21:23 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 440.755473] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.762034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.768854] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.775221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.806323] device bridge0 entered promiscuous mode 01:21:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x3f000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:23 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 440.848289] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.854909] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.880043] device bridge0 left promiscuous mode 01:21:23 executing program 0: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 441.307143] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.313785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.320539] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.326918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.333719] device bridge0 entered promiscuous mode [ 441.342124] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.350970] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:23 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 441.363756] device bridge0 left promiscuous mode 01:21:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 441.412339] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.420666] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.465838] device bridge0 left promiscuous mode [ 441.537232] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.543733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.550462] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.556859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.571387] device bridge0 entered promiscuous mode 01:21:24 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:24 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:24 executing program 0: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 441.613151] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.619707] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.648061] device bridge0 left promiscuous mode [ 441.960683] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.967379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.974120] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.980548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.987199] device bridge0 entered promiscuous mode [ 441.994833] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.001504] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x34000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:24 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:24 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 442.025233] device bridge0 left promiscuous mode 01:21:24 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 442.080129] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.086744] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.098204] device bridge0 left promiscuous mode [ 442.351456] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.358489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.366509] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.373500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.384387] device bridge0 entered promiscuous mode 01:21:24 executing program 0: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 442.410616] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.417168] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.424586] device bridge0 left promiscuous mode [ 442.649590] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.656222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.662973] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.669390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.676116] device bridge0 entered promiscuous mode 01:21:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xfffffff0}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:25 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x0, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 442.698603] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.706132] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.755605] device bridge0 left promiscuous mode 01:21:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:25 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:25 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) [ 442.852779] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.859282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.865996] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.872446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.892248] device bridge0 entered promiscuous mode 01:21:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x175}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 442.900707] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.907286] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.951674] device bridge0 left promiscuous mode 01:21:25 executing program 0: socket$inet(0x2, 0xa, 0x8) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 442.973151] IPVS: ftp: loaded support on port[0] = 21 [ 443.210783] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.217182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.223899] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.230514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.239709] device bridge0 entered promiscuous mode 01:21:25 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x40030000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 443.262879] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.269424] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:25 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:25 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 443.320775] device bridge0 left promiscuous mode [ 443.328309] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.334843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.341575] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.348103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.365758] device bridge0 entered promiscuous mode 01:21:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x2000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:26 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 443.447066] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.453687] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.465907] device bridge0 left promiscuous mode 01:21:26 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) [ 443.740070] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.746710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.753962] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.760481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.767369] device bridge0 entered promiscuous mode [ 443.774549] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.781143] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.797975] device bridge0 left promiscuous mode [ 443.806573] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.813556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.820296] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.826669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.834467] device bridge0 entered promiscuous mode [ 444.058532] device bridge_slave_1 left promiscuous mode [ 444.064098] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.098886] device bridge_slave_0 left promiscuous mode [ 444.104350] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.157553] team0 (unregistering): Port device team_slave_1 removed [ 444.167402] team0 (unregistering): Port device team_slave_0 removed [ 444.179803] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 444.222377] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 444.286891] bond0 (unregistering): Released all slaves [ 444.774968] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.781651] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.790110] device bridge_slave_0 entered promiscuous mode [ 444.835147] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.841645] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.849543] device bridge_slave_1 entered promiscuous mode [ 444.894991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 444.940745] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 445.076616] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 445.123445] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 445.336538] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 445.344169] team0: Port device team_slave_0 added [ 445.387802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 445.395478] team0: Port device team_slave_1 added [ 445.438729] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 445.445601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 445.453952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 445.480271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 445.487104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 445.496548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 445.533685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 445.541638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 445.558622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 445.595736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 445.603332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 445.612661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 445.903314] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.909947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.916521] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.923023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.930525] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 446.380521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 446.866655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 446.961658] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 447.056345] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 447.062914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 447.070088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 447.161312] 8021q: adding VLAN 0 to HW filter on device team0 01:21:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:30 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x3000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:30 executing program 0: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 5: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 447.720053] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.726656] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.749642] device bridge0 left promiscuous mode 01:21:30 executing program 0: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:30 executing program 0: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:30 executing program 0: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 448.227002] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.233529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.240253] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.246610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.253408] device bridge0 entered promiscuous mode [ 448.259268] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 448.265919] bridge0: port 2(bridge_slave_1) entered blocking state 01:21:30 executing program 0: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x3}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 448.272352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.279082] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.285483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.292988] device bridge0 entered promiscuous mode [ 448.307518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:30 executing program 5: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0x0, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 0: r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x3f00000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:31 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xffffff7f00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:31 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0x0, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:31 executing program 0: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 448.592938] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.599489] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.610054] device bridge0 left promiscuous mode 01:21:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 448.870034] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.876515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.883249] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.889674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.896700] device bridge0 entered promiscuous mode [ 448.902537] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 448.909567] bridge0: port 2(bridge_slave_1) entered blocking state 01:21:31 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0x0, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 0: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x9effffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 448.915996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.922717] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.929131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.936058] device bridge0 entered promiscuous mode [ 448.942945] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:31 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x0, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf00}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:31 executing program 0: r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 449.097554] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.104091] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 449.189030] device bridge0 left promiscuous mode [ 449.373234] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.380195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 449.389578] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.396850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 449.407652] device bridge0 entered promiscuous mode [ 449.422379] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 449.436962] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.443610] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.450251] device bridge0 left promiscuous mode [ 449.456514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 449.465266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:32 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x0, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 449.479378] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.485744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 449.492411] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.498853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 449.538068] device bridge0 entered promiscuous mode [ 449.550595] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:32 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x300}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 449.586930] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.593506] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:32 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x0, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:32 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 449.649817] device bridge0 left promiscuous mode 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:32 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:32 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:32 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 450.096479] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.103142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.109835] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.116173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.136252] device bridge0 entered promiscuous mode [ 450.148461] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.155099] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.164581] device bridge0 left promiscuous mode [ 450.172104] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.178579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.185251] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.191680] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:32 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 450.205881] device bridge0 entered promiscuous mode [ 450.211833] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:32 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf00000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:32 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 450.280088] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.286685] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.303719] device bridge0 left promiscuous mode 01:21:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 450.695107] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.701642] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.725926] device bridge0 left promiscuous mode [ 451.051911] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.058583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.065290] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.071749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.078820] device bridge0 entered promiscuous mode [ 451.085917] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.093095] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.100636] device bridge0 left promiscuous mode [ 451.107230] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.113766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.120476] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.126830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.133628] device bridge0 entered promiscuous mode [ 451.140385] bridge0: port 2(bridge_slave_1) entered blocking state 01:21:33 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:33 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:33 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x100000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 451.146884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.147039] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.159875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.166696] device bridge0 entered promiscuous mode [ 451.188267] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:33 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 451.207307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:21:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 451.252023] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.258658] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xfffff000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 451.296263] device bridge0 left promiscuous mode 01:21:33 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:33 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:33 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) [ 451.343041] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.349803] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.374600] device bridge0 left promiscuous mode 01:21:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 451.778413] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.785036] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.791639] device bridge0 left promiscuous mode [ 451.800418] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.807177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.815235] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.822222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.831506] device bridge0 entered promiscuous mode 01:21:34 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:34 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf0ffffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:34 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 01:21:34 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:34 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:34 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) 01:21:34 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) [ 452.118606] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.125238] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 452.167579] device bridge0 left promiscuous mode [ 452.463099] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.470304] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.488030] device bridge0 left promiscuous mode [ 452.705619] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.712502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.721096] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.728077] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.736402] device bridge0 entered promiscuous mode [ 452.751098] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:35 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:35 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:35 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:35 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x2000000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:35 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:35 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xf0ffffffffffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 452.927524] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.934104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.940838] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.947210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.017962] device bridge0 entered promiscuous mode [ 453.026480] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 453.054446] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.061354] bridge0: port 2(bridge_slave_1) entered forwarding state 01:21:35 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:35 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 453.070115] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.077312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.100754] device bridge0 entered promiscuous mode 01:21:35 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 453.124009] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x1000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:35 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:35 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) [ 453.234565] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.241585] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.245875] device bridge0 left promiscuous mode [ 453.256183] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.262739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.270007] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.276377] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:35 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:35 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x400300}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 453.307395] device bridge0 entered promiscuous mode [ 453.366045] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:36 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x20000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:36 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 453.436529] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.443139] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:36 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:36 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 453.499602] device bridge0 left promiscuous mode [ 453.506703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 453.524052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:21:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x4000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:36 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:36 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:36 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 453.653180] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.660282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.668789] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.675741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.712378] device bridge0 entered promiscuous mode [ 453.727034] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 453.813980] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.821989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.831468] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.838813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.855108] device bridge0 entered promiscuous mode 01:21:36 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:36 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xffffff9e}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:36 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:36 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 453.877229] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0xfffffffffffff000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x9effffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:36 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 454.033389] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.040088] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.049376] device bridge0 left promiscuous mode 01:21:36 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2000000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:36 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:36 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 454.145836] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.152906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.161805] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.169054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.259376] device bridge0 entered promiscuous mode [ 454.296024] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 454.320502] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.329053] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.339354] device bridge0 left promiscuous mode 01:21:36 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:36 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:36 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:37 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:37 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 455.049103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 455.057246] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.063765] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.070268] device bridge0 left promiscuous mode [ 455.076436] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.082840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.089485] bridge0: port 1(bridge_slave_0) entered blocking state 01:21:37 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 455.095821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.103754] device bridge0 entered promiscuous mode [ 455.109285] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 455.115880] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.122401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.129566] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.135905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.151959] device bridge0 entered promiscuous mode [ 455.160072] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.166612] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.188944] device bridge0 left promiscuous mode [ 455.377894] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.384859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.393379] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.400732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.409838] device bridge0 entered promiscuous mode [ 455.445790] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.452471] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.460227] device bridge0 left promiscuous mode [ 455.468253] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.475301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.484611] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.491795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.501540] device bridge0 entered promiscuous mode 01:21:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x400300}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:38 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:38 executing program 5: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 455.541661] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.550105] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.559918] device bridge0 left promiscuous mode 01:21:38 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 456.119164] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.125735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.132491] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.138920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.145721] device bridge0 entered promiscuous mode [ 456.151543] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 456.159393] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:38 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf0}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 456.165975] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.188511] device bridge0 left promiscuous mode [ 456.200988] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.207509] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.220220] device bridge0 left promiscuous mode [ 456.429778] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.436369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.443090] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.449478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.456141] device bridge0 entered promiscuous mode [ 456.462720] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.469315] bridge0: port 2(bridge_slave_1) entered forwarding state 01:21:39 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:39 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 456.476061] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.482426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.489496] device bridge0 entered promiscuous mode [ 456.499326] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.505799] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.542368] device bridge0 left promiscuous mode 01:21:39 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 456.574157] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.580778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.587560] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.594005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.601213] device bridge0 entered promiscuous mode [ 456.609641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 456.641069] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.649046] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.669277] device bridge0 left promiscuous mode 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 457.168245] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.175321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.182064] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.188443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.198995] device bridge0 entered promiscuous mode [ 457.210286] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:39 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 457.216834] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.238145] device bridge0 left promiscuous mode [ 457.249506] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.256062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.262780] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.269192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.280349] device bridge0 entered promiscuous mode [ 457.297820] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.306153] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:39 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 457.320165] device bridge0 left promiscuous mode [ 457.574096] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.580646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.587438] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.593861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.601647] device bridge0 entered promiscuous mode [ 457.608450] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.615093] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:40 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 457.621798] device bridge0 left promiscuous mode [ 457.634174] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.640772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.647451] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.653869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.661407] device bridge0 entered promiscuous mode 01:21:40 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x175}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 457.672257] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.680499] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.700468] device bridge0 left promiscuous mode 01:21:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:40 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 458.253846] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.260384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.267059] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.273572] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.280273] device bridge0 entered promiscuous mode [ 458.287430] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.293982] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 458.305462] device bridge0 left promiscuous mode [ 458.319713] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.326273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.332979] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.339406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.349303] device bridge0 entered promiscuous mode 01:21:40 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 458.371701] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.378968] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.412719] device bridge0 left promiscuous mode 01:21:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x1000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 458.768994] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.775554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.782260] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.788695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.796411] device bridge0 entered promiscuous mode [ 458.805106] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.811759] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:41 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 458.818894] device bridge0 left promiscuous mode [ 458.830585] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.837004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.843715] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.850136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.859724] device bridge0 entered promiscuous mode 01:21:41 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 458.870480] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.877907] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.894422] device bridge0 left promiscuous mode [ 459.293099] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.299854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.306531] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.312955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.319679] device bridge0 entered promiscuous mode [ 459.326058] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.332626] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:41 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 459.339997] device bridge0 left promiscuous mode [ 459.347227] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.353800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.360518] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.366877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.374127] device bridge0 entered promiscuous mode 01:21:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x75010000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:41 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 459.390790] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.397320] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.414458] device bridge0 left promiscuous mode [ 459.628418] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.634937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.641680] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.648242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.654976] device bridge0 entered promiscuous mode [ 459.662529] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.670711] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:42 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 459.679074] device bridge0 left promiscuous mode [ 459.727720] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.734302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.741018] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.747412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.766682] device bridge0 entered promiscuous mode 01:21:42 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 459.777468] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.785476] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.794825] device bridge0 left promiscuous mode 01:21:42 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 460.002246] IPVS: ftp: loaded support on port[0] = 21 01:21:42 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7501}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 460.342290] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.349046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.355672] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.362089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.369410] device bridge0 entered promiscuous mode [ 460.379423] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.386056] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.411375] device bridge0 left promiscuous mode [ 460.430937] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.437454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.444171] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.450573] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:43 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 460.457260] device bridge0 entered promiscuous mode [ 460.467044] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.473736] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.481148] device bridge0 left promiscuous mode [ 460.668460] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.675078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.681923] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.688467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.695241] device bridge0 entered promiscuous mode [ 460.702084] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.708759] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 460.716042] device bridge0 left promiscuous mode [ 460.730875] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.737368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.744101] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.750533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.759743] device bridge0 entered promiscuous mode 01:21:43 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 460.776303] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.782818] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.798087] device bridge0 left promiscuous mode [ 461.026782] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.033241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.040456] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.046823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.053564] device bridge0 entered promiscuous mode [ 461.060099] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.066553] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:43 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 461.073130] device bridge0 left promiscuous mode [ 461.089388] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.095982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.102628] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.109148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.116624] device bridge0 entered promiscuous mode 01:21:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3f00}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:43 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 461.128094] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.134637] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.148661] device bridge0 left promiscuous mode [ 461.403051] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.410527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.418167] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.425171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.435164] device bridge0 entered promiscuous mode 01:21:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 461.454155] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.460911] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.467666] device bridge0 left promiscuous mode [ 461.475924] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.482430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.489150] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.495522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.508973] device bridge0 entered promiscuous mode [ 461.521664] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.528750] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 461.560184] device bridge0 left promiscuous mode [ 462.085631] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.092242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.098931] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.105289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.112103] device bridge0 entered promiscuous mode [ 462.128993] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:44 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r1 = dup2(r0, r0) r2 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 462.135653] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.148085] device bridge0 left promiscuous mode [ 462.159994] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.166434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.173146] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.180101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.198445] device bridge0 entered promiscuous mode [ 462.223891] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.230447] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.239368] device bridge0 left promiscuous mode [ 462.431319] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.437946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.444731] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.451192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.458100] device bridge0 entered promiscuous mode [ 462.464823] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.471354] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.477992] device bridge0 left promiscuous mode [ 462.484765] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.491221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.498047] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.504448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.567926] device bridge0 entered promiscuous mode [ 462.583503] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.592388] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.612371] device bridge0 left promiscuous mode [ 463.114677] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.114710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.127951] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.134327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.141197] device bridge0 entered promiscuous mode [ 463.418571] device bridge_slave_1 left promiscuous mode [ 463.424159] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.478799] device bridge_slave_0 left promiscuous mode [ 463.484256] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.557057] team0 (unregistering): Port device team_slave_1 removed [ 463.567014] team0 (unregistering): Port device team_slave_0 removed [ 463.577565] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 463.612459] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 463.685113] bond0 (unregistering): Released all slaves [ 463.934164] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.940840] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.949109] device bridge_slave_0 entered promiscuous mode [ 463.992559] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.999131] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.006530] device bridge_slave_1 entered promiscuous mode [ 464.050225] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 464.094879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 464.228655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 464.277294] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 464.323563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 464.330951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 464.376022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 464.383970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 464.524121] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 464.531720] team0: Port device team_slave_0 added [ 464.575642] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 464.583436] team0: Port device team_slave_1 added [ 464.625680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 464.675198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 464.722840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 464.730326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 464.748257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 464.786869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 464.794547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 464.813712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 465.156660] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.163328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.170007] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.176365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.183916] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 465.308040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 466.133587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 466.225408] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 466.318203] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 466.324357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 466.331523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 466.422753] 8021q: adding VLAN 0 to HW filter on device team0 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xffffff9e}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:49 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:49 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf0ffffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 467.062816] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.069480] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.078350] device bridge0 left promiscuous mode [ 467.098606] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.105267] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 467.114176] device bridge0 left promiscuous mode 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 467.481443] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.487979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.494824] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.501500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.508671] device bridge0 entered promiscuous mode [ 467.516851] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.524158] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:50 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 467.542718] device bridge0 left promiscuous mode [ 467.978149] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.984790] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.991982] device bridge0 left promiscuous mode [ 467.999219] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.005912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.012657] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.019040] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 468.025800] device bridge0 entered promiscuous mode [ 468.032302] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.038806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.045479] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.051912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.060107] device bridge0 entered promiscuous mode [ 468.067758] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.074181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.080886] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.087271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.101799] device bridge0 entered promiscuous mode [ 468.117245] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x200000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:50 executing program 1: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 468.123766] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.144987] device bridge0 left promiscuous mode [ 468.189753] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.196275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.203047] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.209485] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 468.242908] device bridge0 entered promiscuous mode [ 468.258144] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.265830] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:50 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 468.294992] device bridge0 left promiscuous mode 01:21:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:51 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 469.048191] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.054858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.061569] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.067981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.075014] device bridge0 entered promiscuous mode [ 469.082343] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.088888] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 469.098229] device bridge0 left promiscuous mode [ 469.291468] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.298092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.304721] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.311164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.318000] device bridge0 entered promiscuous mode [ 469.323668] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 469.331786] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.338326] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.345339] device bridge0 left promiscuous mode [ 469.352942] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.359384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.366001] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.372397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.379248] device bridge0 entered promiscuous mode [ 469.385676] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:51 executing program 0: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:51 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x9effffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:51 executing program 1: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 469.392217] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.399402] device bridge0 left promiscuous mode [ 469.413194] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.419727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.426399] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.433285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.445139] device bridge0 entered promiscuous mode 01:21:52 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 469.465400] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.473727] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.509637] device bridge0 left promiscuous mode 01:21:52 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:52 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:52 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:52 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:52 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:52 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 470.176648] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.183641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.190402] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.196775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.203946] device bridge0 entered promiscuous mode [ 470.213907] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.220751] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 470.238773] device bridge0 left promiscuous mode [ 470.388831] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.395398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.402138] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.408528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.415216] device bridge0 entered promiscuous mode [ 470.421942] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 470.429421] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.435975] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.446020] device bridge0 left promiscuous mode [ 470.453245] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.459714] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.466821] device bridge0 left promiscuous mode [ 470.473188] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.479659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.486398] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.492949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.500074] device bridge0 entered promiscuous mode [ 470.506315] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.512794] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.519607] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.526222] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:53 executing program 0: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xfffff000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:53 executing program 1: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:53 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 470.541345] device bridge0 entered promiscuous mode [ 470.548842] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.555379] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.562573] device bridge0 left promiscuous mode 01:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 471.154461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 471.162476] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.168960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.175618] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.182051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.188926] device bridge0 entered promiscuous mode [ 471.194569] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:21:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 471.204044] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.210609] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.218484] device bridge0 left promiscuous mode [ 471.230443] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.239382] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.250778] device bridge0 left promiscuous mode [ 471.556120] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.562656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.569461] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.576097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.583410] device bridge0 entered promiscuous mode [ 471.589867] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.596356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.603456] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.609862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.617430] device bridge0 entered promiscuous mode [ 471.628344] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.634905] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.643733] device bridge0 left promiscuous mode [ 471.651987] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.659022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.665623] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.672049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.679952] device bridge0 entered promiscuous mode 01:21:54 executing program 0: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:54 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x4000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:54 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) clone(0x0, &(0x7f0000000540)="e943a9", &(0x7f00000001c0), &(0x7f0000000380), &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000006c0)=""/117, &(0x7f0000000280)=0xfffffffffffffdea) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, r0, 0x0, 0x12, &(0x7f0000000480)='/dev/loop-control\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, r0, 0x0, 0xa, &(0x7f00000003c0)='selfppp13\x00'}, 0x30) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000100)=""/189) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffffe) [ 471.700764] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.709132] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.732601] device bridge0 left promiscuous mode 01:21:54 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:54 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:54 executing program 1: 01:21:54 executing program 1: 01:21:54 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:54 executing program 1: [ 472.232304] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.238931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.245778] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.252196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.259092] device bridge0 entered promiscuous mode [ 472.264599] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 472.272923] bridge0: port 2(bridge_slave_1) entered disabled state 01:21:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 472.279567] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.286468] device bridge0 left promiscuous mode [ 472.308210] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.314822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.321676] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.328091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.338934] device bridge0 entered promiscuous mode [ 472.354888] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.364179] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.389458] device bridge0 left promiscuous mode [ 472.433281] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.439796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.446559] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.452991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.460445] device bridge0 entered promiscuous mode [ 472.466772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 472.477097] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.484861] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.492876] device bridge0 left promiscuous mode 01:21:55 executing program 0: 01:21:55 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:55 executing program 1: 01:21:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xfffffffffffff000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:55 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:55 executing program 1: 01:21:55 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:55 executing program 0: 01:21:55 executing program 1: 01:21:55 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:55 executing program 1: [ 473.259130] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.265709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.272538] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.278910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.285535] device bridge0 entered promiscuous mode [ 473.293498] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.300196] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:55 executing program 0: 01:21:55 executing program 1: 01:21:55 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 473.307037] device bridge0 left promiscuous mode 01:21:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xffffffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 473.370369] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.376911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.383615] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.390026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.468006] device bridge0 entered promiscuous mode 01:21:56 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:56 executing program 1: 01:21:56 executing program 0: 01:21:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xffffff7f}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:56 executing program 0: 01:21:56 executing program 1: 01:21:56 executing program 1: 01:21:56 executing program 0: 01:21:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 473.699620] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.706374] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.757315] device bridge0 left promiscuous mode [ 473.799080] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.805651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.812409] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.818801] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.842595] device bridge0 entered promiscuous mode 01:21:56 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:56 executing program 0: 01:21:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:56 executing program 1: 01:21:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:56 executing program 0: 01:21:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x20000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:56 executing program 1: 01:21:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 473.978952] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.985533] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:56 executing program 0: 01:21:56 executing program 1: [ 474.054607] device bridge0 left promiscuous mode [ 474.096622] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.103575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.110348] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.116733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.146044] device bridge0 entered promiscuous mode 01:21:56 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:56 executing program 0: 01:21:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x100000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:56 executing program 1: 01:21:56 executing program 0: 01:21:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf0ffffffffffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 474.258308] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.264852] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:56 executing program 1: [ 474.329382] device bridge0 left promiscuous mode 01:21:56 executing program 0: 01:21:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 474.360290] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.366736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.373491] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.380161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.389534] device bridge0 entered promiscuous mode 01:21:57 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3f00000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:57 executing program 1: 01:21:57 executing program 0: 01:21:57 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) syz_open_dev$mice(&(0x7f00000076c0)='/dev/input/mice\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007900)=[{{&(0x7f0000000480)=@l2, 0x80, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x3ff}}, {{&(0x7f0000002900)=@can, 0x80, &(0x7f0000003e40)=[{&(0x7f0000002a80)=""/233, 0xe9}], 0x1, &(0x7f0000003ec0)=""/201, 0xc9}}], 0x2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x4, 0x84400) [ 474.565573] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.572736] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.602971] device bridge0 left promiscuous mode 01:21:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x9effffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:57 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) 01:21:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 474.618923] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.625357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.632090] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.638543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.660086] device bridge0 entered promiscuous mode 01:21:57 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x5, 0x0, [0x40000021]}) 01:21:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) sendto$packet(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random='X;TfMy'}, 0x14) 01:21:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 474.855162] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.861712] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:57 executing program 1: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000440)=""/12) [ 474.915734] device bridge0 left promiscuous mode 01:21:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:57 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) recvmmsg(r0, &(0x7f0000000dc0)=[{{&(0x7f0000000000)=@pppol2tpin6, 0x80, &(0x7f0000000280), 0x0, &(0x7f00000001c0)=""/27, 0x1b}}], 0x1, 0x0, &(0x7f0000000e40)={0x0, 0x1c9c380}) 01:21:57 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9d2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000480), &(0x7f0000000500)=0x8) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getpeername(r0, &(0x7f0000000640)=@xdp, &(0x7f00000006c0)=0x80) keyctl$negate(0xd, 0x0, 0xfffffffffffffffe, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xffffffffffffffc6, &(0x7f00000005c0)}, &(0x7f0000000340)=0x1da) [ 474.948623] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.955187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.962016] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.968472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.989463] device bridge0 entered promiscuous mode 01:21:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf0ffffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:57 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x0, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 01:21:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x4000000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 475.177670] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.184321] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.195357] device bridge0 left promiscuous mode [ 475.204630] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.211700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.218438] bridge0: port 1(bridge_slave_0) entered blocking state 01:21:57 executing program 0: mlockall(0x4) 01:21:57 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 475.224815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.234664] device bridge0 entered promiscuous mode [ 475.252397] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:21:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7501000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 475.353931] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:21:57 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000080)=0x7c) read(r0, &(0x7f00000002c0)=""/187, 0xffe9) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 01:21:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 475.397182] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.403937] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 01:21:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 475.479026] device bridge0 left promiscuous mode 01:21:58 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x40030000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 475.523346] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.530081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.536772] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.543336] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:58 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 475.643594] device bridge0 entered promiscuous mode 01:21:58 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00h\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2f00, [{{{0xb, 0x0, 0x0, 'bond0\x00', 'team0\x00', 'bond0\x00', 'veth1_to_bridge\x00', @remote, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}]}, 0x248) 01:21:58 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) 01:21:58 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 475.756527] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the (last) chain 01:21:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf00000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 475.859844] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:0 01:21:58 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB='ub'], &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ubifs\x00', 0x0, &(0x7f0000000140)='adfs\x00') 01:21:58 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 475.913252] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.919772] bridge0: port 1(bridge_slave_0) entered disabled state 01:21:58 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001280)={'filter\x00', 0x4}, 0x14) [ 475.953769] device bridge0 left promiscuous mode 01:21:58 executing program 1: r0 = memfd_create(&(0x7f0000000140)="13287a350ac386c52b", 0x0) unshare(0x20400) close(r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000180)=""/239}, 0x18) 01:21:58 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001c00)={0xa, 0x0, [{0x2, 0x4c, &(0x7f00000001c0)=""/76}, {0xd000, 0x0, &(0x7f0000000340)}, {0x0, 0x6, &(0x7f0000000380)=""/6}, {0xf000, 0x57, &(0x7f00000004c0)=""/87}, {0xf001, 0x73, &(0x7f0000001640)=""/115}, {0x3000, 0x78, &(0x7f00000016c0)=""/120}, {0x15004, 0x1d, &(0x7f0000001a40)=""/29}, {0x0, 0xbc, &(0x7f0000001a80)=""/188}, {0x1f000, 0x0, 0xffffffffffffffff}, {0x2000, 0x8c, &(0x7f0000001b40)=""/140}]}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) [ 476.006782] UBIFS error (pid: 25893): cannot open "ub", error -22 01:21:58 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 476.303487] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.310576] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.328863] device bridge0 left promiscuous mode [ 476.336055] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.342621] bridge0: port 2(bridge_slave_1) entered forwarding state 01:21:58 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:58 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 476.349511] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.356023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.364468] device bridge0 entered promiscuous mode 01:21:58 executing program 0: socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) mq_timedreceive(r1, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}) 01:21:58 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x0, @dev}}, 0x0, 0x0, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x20, 0xffffffffffffffff) 01:21:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf0ffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 476.501004] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.507641] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.537725] device bridge0 left promiscuous mode 01:21:59 executing program 0: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) getsockname$packet(r0, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000600)=0x14) 01:21:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3f000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x8002, &(0x7f00000000c0)=0x6, 0x5) 01:21:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) [ 476.557101] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.563650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.570358] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.576815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.714663] device bridge0 entered promiscuous mode 01:21:59 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x0, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:59 executing program 0: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 01:21:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:21:59 executing program 1: r0 = memfd_create(&(0x7f0000000300)="23d35cd3cfec61f41a646576656d3100", 0x0) unshare(0x20400) close(r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) 01:21:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001c00)={0xa, 0x0, [{0x2, 0x4c, &(0x7f00000001c0)=""/76}, {0xd000, 0x0, &(0x7f0000000340)}, {0xd000, 0x6, &(0x7f0000000380)=""/6}, {0xf000, 0x57, &(0x7f00000004c0)=""/87}, {0xf001, 0x73, &(0x7f0000001640)=""/115}, {0x3000, 0x78, &(0x7f00000016c0)=""/120}, {0x15004, 0x1d, &(0x7f0000001a40)=""/29}, {0x0, 0xbc, &(0x7f0000001a80)=""/188}, {0x1f000, 0x0, 0xffffffffffffffff}, {0x2000, 0x8c, &(0x7f0000001b40)=""/140}]}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) [ 476.914392] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.921069] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.978479] device bridge0 left promiscuous mode 01:21:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:21:59 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$intptr(0x3f, 0x40) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x7, 0x10}, &(0x7f0000000240)=0xc) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x918, 0x4) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) [ 476.999044] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.005468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.012180] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.018583] bridge0: port 1(bridge_slave_0) entered forwarding state 01:21:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xfffffff0}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 477.097078] device bridge0 entered promiscuous mode 01:21:59 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x0, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:21:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 477.139694] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:21:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x300}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x80100000000040, &(0x7f0000000040)="10aa02a0f4e6b75e1bb9a6a61bf10b180c4823e0ea3c4c9b7a3ab949e1c95e2f815eab1cf0a5716a47f2be6c594808ce160334bc695bbf54c6801b1e9b9909fc2f010000004c59ec168a186b70781f93a63bda86ae", 0x55) 01:21:59 executing program 1: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) fsync(r0) [ 477.279662] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.286255] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.303496] device bridge0 left promiscuous mode [ 477.312131] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.318735] bridge0: port 2(bridge_slave_1) entered forwarding state 01:21:59 executing program 0: unshare(0x20400) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 01:21:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xf00}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:21:59 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) [ 477.325448] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.332375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.345445] device bridge0 entered promiscuous mode 01:21:59 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:00 executing program 0: socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x8002, &(0x7f00000000c0)=0xfffffffffffffffd, 0x5) 01:22:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0xffffff7f00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:00 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:00 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240), 0x1c) [ 477.538385] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.544981] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x40000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 477.589246] device bridge0 left promiscuous mode [ 477.605651] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.612151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.619326] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.625834] bridge0: port 1(bridge_slave_0) entered forwarding state 01:22:00 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:00 executing program 0: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) fsync(r0) 01:22:00 executing program 1: r0 = memfd_create(&(0x7f0000000000)="23d35cd3cfec61f41a646576656d3100", 0x0) unshare(0x20400) fcntl$setlease(r0, 0x400, 0x2) 01:22:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 477.727746] device bridge0 entered promiscuous mode 01:22:00 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:00 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x2000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:00 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:00 executing program 0: r0 = memfd_create(&(0x7f00000047c0)="23d35cd3cfec6176656d310022c24e9c412f36aafc68972a99ff5d61e44568d255ba433e46cd6b71aff69b5b0c52401423ea700e09cad69c4c3ae94b97ca8e7d9fcfd4bfcd46d94030d76cdcb65482a9937a7b3b5105aac38a118e4e713e2470750fa3d0e618578e100cb75734fe7227", 0x0) unshare(0x20400) close(r0) pwrite64(r0, &(0x7f0000000100), 0x0, 0x0) [ 477.908303] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.914960] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:00 executing program 1: socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, &(0x7f00000000c0), 0x0) 01:22:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 477.983512] device bridge0 left promiscuous mode 01:22:00 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) [ 478.015472] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.022109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.028843] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.035226] bridge0: port 1(bridge_slave_0) entered forwarding state 01:22:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x34000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 478.078098] device bridge0 entered promiscuous mode 01:22:00 executing program 0: r0 = memfd_create(&(0x7f0000000000)="23d35cd3cfec61f41a646576656d3100", 0x0) unshare(0x20400) close(r0) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) 01:22:00 executing program 1: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) fallocate(r0, 0x0, 0x0, 0x0) 01:22:00 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:00 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x300000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:00 executing program 0: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) 01:22:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001c00)={0x7, 0x0, [{0x2, 0x4c, &(0x7f00000001c0)=""/76}, {0xd000, 0x0, &(0x7f0000000340)}, {0xd000, 0x6, &(0x7f0000000380)=""/6}, {0x3000, 0x78, &(0x7f00000016c0)=""/120}, {0x15004, 0x1d, &(0x7f0000001a40)=""/29}, {0x0, 0xbc, &(0x7f0000001a80)=""/188}, {0x2000, 0x8c, &(0x7f0000001b40)=""/140}]}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) 01:22:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x9effffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:00 executing program 5: r0 = socket(0x0, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x8, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) 01:22:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 478.492489] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.499140] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.524886] device bridge0 left promiscuous mode 01:22:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 478.538869] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.545377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.552099] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.558519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.602090] device bridge0 entered promiscuous mode 01:22:01 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:01 executing program 5: r0 = socket(0x0, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3f00000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:22:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x20000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:01 executing program 5: r0 = socket(0x0, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) [ 478.829842] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:22:01 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xffffff7f}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:01 executing program 0: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:01 executing program 5: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x1000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:01 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:02 executing program 5: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x34000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 5: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:02 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:02 executing program 5: socket(0x40000000015, 0x805, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf00}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:02 executing program 5: socket(0x40000000015, 0x805, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) getpid() clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 0: r0 = socket(0x0, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3f00}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:02 executing program 5: socket(0x40000000015, 0x805, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 01:22:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:02 executing program 0: r0 = socket(0x0, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x7501000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:02 executing program 0: r0 = socket(0x0, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:02 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xfffff000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 0: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf0ffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 0: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:03 executing program 0: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xfffffff0}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) socket$inet6(0xa, 0x3, 0x800000000000004) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:03 executing program 0: socket(0x40000000015, 0x805, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) socket$inet6(0xa, 0x3, 0x800000000000004) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xfffffffffffff000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:03 executing program 0: socket(0x40000000015, 0x805, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:03 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xffffffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) [ 480.919914] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.926523] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) [ 480.984590] device bridge0 left promiscuous mode 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x9effffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001200)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000001300)=0xe8) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:03 executing program 0: socket(0x40000000015, 0x805, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:03 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000001100)='/dev/null\x00', 0x40000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf0ffffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) 01:22:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:03 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xffffff9e}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00'}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x610000, 0x0) memfd_create(&(0x7f0000000000)='selinuxuser\x00', 0x2) 01:22:03 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:22:03 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x100000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:03 executing program 0: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) shutdown(r0, 0x0) 01:22:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:04 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:22:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) 01:22:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000680), &(0x7f00000006c0)=0x4) 01:22:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf0}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:04 executing program 0: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) flock(r0, 0x0) 01:22:04 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x0, 0x0, {}, {}, @cond}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:22:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x175}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="030000000000000008001b0000000000"], 0x1}}, 0x0) 01:22:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x300000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) 01:22:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:05 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 01:22:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x40000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000004340)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x8, 0x16, [{0x4}]}]}, 0x30}}, 0x0) [ 482.918781] A link change request failed with some changes committed already. Interface bond_slave_1 may have been left with an inconsistent configuration, please check. 01:22:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3f000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 483.251517] IPVS: ftp: loaded support on port[0] = 21 [ 483.453905] A link change request failed with some changes committed already. Interface bond_slave_1 may have been left with an inconsistent configuration, please check. 01:22:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) tkill(r2, 0x1000000000016) 01:22:06 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bond_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000004340)=ANY=[@ANYBLOB="00000000000000dd08001b13600000000800160014000100"], 0x1}}, 0x0) 01:22:06 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x20}, {0x6}]}, 0x10) 01:22:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x40030000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 484.988210] device bridge_slave_1 left promiscuous mode [ 484.993901] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.038703] device bridge_slave_0 left promiscuous mode [ 485.044307] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.167738] team0 (unregistering): Port device team_slave_1 removed [ 487.177615] team0 (unregistering): Port device team_slave_0 removed [ 487.188402] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 487.232008] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 487.297693] bond0 (unregistering): Released all slaves [ 487.373173] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.379935] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.386832] device bridge_slave_0 entered promiscuous mode [ 487.415970] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.423143] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.430425] device bridge_slave_1 entered promiscuous mode [ 487.458347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 487.486102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 487.579364] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 487.627012] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 487.841150] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 487.849503] team0: Port device team_slave_0 added [ 487.893090] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 487.900575] team0: Port device team_slave_1 added [ 487.944173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 487.992155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 488.039236] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 488.046376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 488.064377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 488.102380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 488.109603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 488.127511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 488.571578] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.578059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.584627] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.591019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.598267] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 489.418031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 489.652625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 489.743077] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 489.832841] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 489.839630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 489.846731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 489.944058] 8021q: adding VLAN 0 to HW filter on device team0 01:22:13 executing program 1: socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/176, 0xb0, 0x0, &(0x7f0000000180)=@sco={0x1f, {0x0, 0x7f}}, 0x80) r1 = dup(r0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000040)={0x7fff, {0x1, 0x0, 0x100, 0x578, 0x3, 0xff}}) ioctl$UI_DEV_DESTROY(r0, 0x5502) 01:22:13 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x200000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:13 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f00000000c0), 0x71) 01:22:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) tkill(r2, 0x1000000000016) 01:22:13 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf0ffffff00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 490.526704] input: syz1 as /devices/virtual/input/input5 01:22:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4), 0x1c) 01:22:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x0, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x0, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x400300}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/94, 0xfffffee4}], 0x1, &(0x7f00000003c0)=""/90, 0x5a}, 0x40000002) [ 490.717539] input: syz1 as /devices/virtual/input/input6 01:22:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x0, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:13 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:13 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmmsg(r0, &(0x7f0000005000)=[{{&(0x7f00000028c0)=@generic={0x0, "2f2a605dfe8b4279527343cffe7d0368fd49a12befedcaa56498364510e36ad9cb6c2dda650fdc9a22c44d2ad9a4fc245e5f05e9b2d97aad34b1b1bead8c0f699e73d0355251ea0d041fba332c41bda85075ce2c0fb2fa903b29b970c8759148b427bed7250bf53c0b3519c5fa143c853a392efb43a764f6f94be6ea08a9"}, 0x80, &(0x7f0000003bc0), 0x0, &(0x7f0000003c40), 0x0, 0xc004}, 0x5}], 0x1, 0x4000000) 01:22:16 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x308) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) write$binfmt_aout(r1, &(0x7f0000000200), 0x20) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:22:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x75010000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:16 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="5500000018007f1dfd0000b2a4a280930a06000000a84309910000000e0008000a000c00060000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 01:22:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) tkill(r2, 0x1000000000016) 01:22:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488d") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:16 executing program 3: [ 493.537045] netlink: 41 bytes leftover after parsing attributes in process `syz-executor3'. [ 493.556953] netlink: 41 bytes leftover after parsing attributes in process `syz-executor3'. 01:22:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488d") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:16 executing program 3: 01:22:16 executing program 0: 01:22:16 executing program 3: 01:22:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xffffff7f00000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d76") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d76") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:19 executing program 3: 01:22:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:19 executing program 0: 01:22:19 executing program 0: 01:22:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d7660") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:19 executing program 3: 01:22:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf00000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d7660") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:22 executing program 3: 01:22:22 executing program 0: 01:22:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4000000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d7660") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:22 executing program 0: 01:22:22 executing program 3: 01:22:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x7501}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:25 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) 01:22:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_nanosleep(0x2, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000003c00)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x15) 01:22:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x2000000000000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000140)) clock_gettime(0x80005, &(0x7f00000002c0)) 01:22:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/249, 0xf9) 01:22:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x300}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) 01:22:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) 01:22:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000200)=""/35, 0x23}], 0x5, &(0x7f0000000b40)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0x50, &(0x7f0000000940)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r2, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=r2, 0xec) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r3, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000900)='./file0\x00', 0x0, 0xf}, 0x10) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000700)) r5 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x7, 0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff}) r7 = getpid() socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000880)={r5, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0x0, r8}, 0x2c) perf_event_open(&(0x7f0000000ac0)={0x4, 0x70, 0xbfb5, 0xffffffffffff7fff, 0x80000001, 0xffffffff, 0x0, 0x2, 0x0, 0x1, 0x6, 0x0, 0xf, 0x6, 0x2, 0xfff, 0x4, 0x9, 0x4, 0x101, 0x9, 0x3, 0x5, 0x20, 0x5, 0x7f, 0x7, 0x4, 0x1, 0x4, 0x7, 0x3, 0x5, 0xfffffffffffffff7, 0x7, 0x7fff, 0x2, 0x14, 0x0, 0x5, 0x7, @perf_config_ext={0x6, 0x8}, 0x400, 0x1000, 0x5, 0x1, 0x3, 0x58ad}, r7, 0x0, r4, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a40)={&(0x7f0000000a00)='./file0\x00', r8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r8, r9}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r9}, 0x10) socketpair(0x7, 0xa, 0x4b, &(0x7f0000000800)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000540)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r9}) 01:22:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf0ffffffffffff}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x40) clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a4a000), &(0x7f00007c4000)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='/dev/loop-control\x00', 0xffffffffffffffff}, 0x30) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 01:22:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) 01:22:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0xf000000}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000002c0)) 01:22:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x3, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3f00}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 505.925890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 01:22:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000440)={0x0, 0x31, 0x0, {}, {}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) 01:22:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0xa, @remote}]}, 0x20}}, 0x0) 01:22:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000200)=""/35, 0x23}], 0x5, &(0x7f0000000b40)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0x50, &(0x7f0000000940)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r2, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=r2, 0xec) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r3, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000900)='./file0\x00', 0x0, 0xf}, 0x10) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000700)) r5 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x7, 0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff}) r7 = getpid() socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000880)={r5, r6}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0x0, r8}, 0x2c) perf_event_open(&(0x7f0000000ac0)={0x4, 0x70, 0xbfb5, 0xffffffffffff7fff, 0x80000001, 0xffffffff, 0x0, 0x2, 0x0, 0x1, 0x6, 0x0, 0xf, 0x6, 0x2, 0xfff, 0x4, 0x9, 0x4, 0x101, 0x9, 0x3, 0x5, 0x20, 0x5, 0x7f, 0x7, 0x4, 0x1, 0x4, 0x7, 0x3, 0x5, 0xfffffffffffffff7, 0x7, 0x7fff, 0x2, 0x14, 0x0, 0x5, 0x7, @perf_config_ext={0x6, 0x8}, 0x400, 0x1000, 0x5, 0x1, 0x3, 0x58ad}, r7, 0x0, r4, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a40)={&(0x7f0000000a00)='./file0\x00', r8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r8, r9}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r9}, 0x10) socketpair(0x7, 0xa, 0x4b, &(0x7f0000000800)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000540)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r9}) 01:22:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x3, @remote}]}, 0x20}}, 0x0) [ 506.631495] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.638282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 506.644904] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.651331] bridge0: port 1(bridge_slave_0) entered forwarding state 01:22:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:29 executing program 3: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 506.692325] device bridge0 entered promiscuous mode [ 506.699975] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 506.711402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 506.722384] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.732116] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote={0xac, 0x67}}]}, 0x20}}, 0x0) 01:22:29 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 506.809890] bridge0: port 2(bridge_slave_1) entered blocking state [ 506.816836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 506.823496] bridge0: port 1(bridge_slave_0) entered blocking state [ 506.830131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 506.888165] device bridge0 entered promiscuous mode 01:22:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote={0xac, 0xf}}]}, 0x20}}, 0x0) 01:22:29 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 507.017694] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.024547] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.055405] device bridge0 left promiscuous mode [ 507.370873] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.378219] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.387214] device bridge0 left promiscuous mode 01:22:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) [ 507.800008] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.806518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 507.813264] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.819691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 507.826455] device bridge0 entered promiscuous mode [ 507.833141] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.839669] bridge0: port 2(bridge_slave_1) entered forwarding state 01:22:30 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 507.846362] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.852819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 507.864599] device bridge0 entered promiscuous mode [ 507.878319] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.884805] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote={0xac, 0x14, 0xf}}]}, 0x20}}, 0x0) 01:22:30 executing program 3: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 507.906209] device bridge0 left promiscuous mode [ 507.935826] bridge0: port 2(bridge_slave_1) entered blocking state [ 507.942429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 507.949192] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.955610] bridge0: port 1(bridge_slave_0) entered forwarding state 01:22:30 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 507.993818] device bridge0 entered promiscuous mode [ 508.004229] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.011018] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.028352] device bridge0 left promiscuous mode 01:22:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) [ 508.408315] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.415016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.421827] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.428288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.435891] device bridge0 entered promiscuous mode [ 508.446204] bridge0: port 2(bridge_slave_1) entered disabled state 01:22:31 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 508.455099] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.474029] device bridge0 left promiscuous mode 01:22:31 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 508.638650] IPVS: ftp: loaded support on port[0] = 21 [ 508.964510] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.971218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.978020] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.984408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.991527] device bridge0 entered promiscuous mode [ 508.998521] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.005231] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:31 executing program 3: socket$inet(0x2, 0xa, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 509.012669] device bridge0 left promiscuous mode [ 509.030832] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.037398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.044138] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.050653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.059342] device bridge0 entered promiscuous mode 01:22:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote={0xac, 0x14, 0x67}}]}, 0x20}}, 0x0) 01:22:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:31 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 509.078837] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.085368] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.104138] device bridge0 left promiscuous mode [ 509.501599] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.508119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.514805] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.521199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.528754] device bridge0 entered promiscuous mode [ 509.544401] bridge0: port 2(bridge_slave_1) entered disabled state 01:22:32 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) [ 509.551144] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.558205] device bridge0 left promiscuous mode [ 509.877772] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.884354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.891115] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.897470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.904678] device bridge0 entered promiscuous mode [ 509.917417] bridge0: port 2(bridge_slave_1) entered disabled state 01:22:32 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 509.924534] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x33fe0}}, 0x0) 01:22:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) [ 509.971947] device bridge0 left promiscuous mode [ 510.033216] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.039686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.046378] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.053257] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.068041] device bridge0 entered promiscuous mode 01:22:32 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 510.094445] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.101326] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.109640] device bridge0 left promiscuous mode 01:22:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0xf}}, 0x0) [ 510.450242] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.457640] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.498536] device bridge0 left promiscuous mode [ 510.938004] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.944491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.951225] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.957586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.964389] device bridge0 entered promiscuous mode [ 510.971304] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.978265] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.984754] device bridge0 left promiscuous mode [ 510.991525] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.997932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.998087] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.010888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.011068] device bridge0 entered promiscuous mode [ 511.318825] device bridge_slave_1 left promiscuous mode [ 511.324376] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.378657] device bridge_slave_0 left promiscuous mode [ 511.384124] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.437749] team0 (unregistering): Port device team_slave_1 removed [ 511.447541] team0 (unregistering): Port device team_slave_0 removed [ 511.459988] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 511.501588] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 511.577267] bond0 (unregistering): Released all slaves [ 511.788763] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.795170] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.802382] device bridge_slave_0 entered promiscuous mode [ 511.832575] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.839653] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.846952] device bridge_slave_1 entered promiscuous mode [ 511.891412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 511.937630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 512.074123] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 512.121824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 512.200303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 512.207188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 512.254731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 512.262765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 512.411521] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 512.419273] team0: Port device team_slave_0 added [ 512.464430] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 512.471926] team0: Port device team_slave_1 added [ 512.515761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 512.564620] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 512.611982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 512.619570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 512.637455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 512.676332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 512.683791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 512.701288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 513.077566] bridge0: port 2(bridge_slave_1) entered blocking state [ 513.083964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 513.090690] bridge0: port 1(bridge_slave_0) entered blocking state [ 513.097041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 513.104945] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 513.147989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 514.040938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 514.141085] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 514.231984] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 514.238340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 514.245391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 514.339060] 8021q: adding VLAN 0 to HW filter on device team0 01:22:37 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:37 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x10}}, 0x0) 01:22:37 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0xfffffdef}}, 0x0) 01:22:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 515.012658] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.019230] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.031331] device bridge0 left promiscuous mode 01:22:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0xc0}}, 0x0) 01:22:37 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:37 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:37 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) [ 515.601763] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.609633] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.617681] device bridge0 left promiscuous mode [ 515.648290] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.654748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.661605] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.668061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.674958] device bridge0 entered promiscuous mode [ 515.683663] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.690363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.698844] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.705998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.715577] device bridge0 entered promiscuous mode [ 515.725657] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.732160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.738924] bridge0: port 1(bridge_slave_0) entered blocking state 01:22:38 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 515.745304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.752096] device bridge0 entered promiscuous mode [ 515.757754] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 01:22:38 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:38 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0xec0}}, 0x0) 01:22:38 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x7ffff000}}, 0x0) 01:22:38 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) [ 515.923262] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.929871] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.962021] device bridge0 left promiscuous mode 01:22:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x200004a0}}, 0x0) 01:22:38 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 516.403887] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.410423] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.416941] device bridge0 left promiscuous mode [ 516.545280] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.552379] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.559038] device bridge0 left promiscuous mode [ 516.566092] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.572657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.580090] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.586551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.594318] device bridge0 entered promiscuous mode [ 516.599989] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 516.607246] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.614201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.622130] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.628935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.638422] device bridge0 entered promiscuous mode 01:22:39 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 516.647085] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.653816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.662808] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.669812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.682033] device bridge0 entered promiscuous mode [ 516.725905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 516.763981] bridge0: port 2(bridge_slave_1) entered disabled state 01:22:39 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x17}}, 0x0) 01:22:39 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:39 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 516.770726] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.777458] device bridge0 left promiscuous mode 01:22:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x2}, 0x0) 01:22:39 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:39 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:39 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) [ 517.183263] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.190366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.196974] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.203389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.211373] device bridge0 entered promiscuous mode [ 517.218094] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.224617] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.248353] device bridge0 left promiscuous mode 01:22:39 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x7fffffff) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 517.505372] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.511919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.519049] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.525424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.532934] device bridge0 entered promiscuous mode [ 517.541736] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.548352] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.554965] device bridge0 left promiscuous mode [ 517.563737] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.570307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.578063] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.584986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.600683] device bridge0 entered promiscuous mode 01:22:40 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:40 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 517.627582] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.635495] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.646316] device bridge0 left promiscuous mode 01:22:40 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) [ 518.394422] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.401184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.407947] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.414342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.421179] device bridge0 entered promiscuous mode 01:22:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0xffffff1f}, 0x0) 01:22:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = epoll_create1(0x0) r1 = gettid() epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:41 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x7fffffff) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 518.439478] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.446070] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.465116] device bridge0 left promiscuous mode 01:22:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x300}, 0x0) 01:22:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x8}, 0x0) [ 518.821556] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.828062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.834748] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.841187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.848122] device bridge0 entered promiscuous mode [ 518.853659] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 518.860588] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.867182] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.874975] device bridge0 left promiscuous mode [ 518.883690] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.890119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.896768] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.903219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.910472] device bridge0 entered promiscuous mode 01:22:41 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:41 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 518.927431] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.934064] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.942666] device bridge0 left promiscuous mode 01:22:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) [ 519.304577] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.311268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 519.319492] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.326606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 519.334934] device bridge0 entered promiscuous mode [ 519.359559] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.366605] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.410357] device bridge0 left promiscuous mode 01:22:42 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x3}, 0x0) 01:22:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_create1(0x0) r1 = gettid() epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:42 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r2 = dup2(r0, r0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r4 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x7fffffff) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 519.652852] IPVS: ftp: loaded support on port[0] = 21 [ 519.778007] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.784678] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.791655] device bridge0 left promiscuous mode [ 519.805786] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.812255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 519.818977] bridge0: port 1(bridge_slave_0) entered blocking state 01:22:42 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 519.825466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 519.832743] device bridge0 entered promiscuous mode [ 519.838614] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 519.845333] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.851824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 519.858537] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.864926] bridge0: port 1(bridge_slave_0) entered forwarding state 01:22:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_create1(0x0) r1 = gettid() epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) 01:22:42 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 519.883174] device bridge0 entered promiscuous mode [ 519.896668] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.904431] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.948485] device bridge0 left promiscuous mode 01:22:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 520.398951] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.405537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 520.412282] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.418676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 520.425749] device bridge0 entered promiscuous mode [ 520.435856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 520.455981] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.462656] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.474753] device bridge0 left promiscuous mode 01:22:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x3f00000000000000}, 0x0) [ 520.738200] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.745134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 520.751894] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.758319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 520.765307] device bridge0 entered promiscuous mode [ 520.778700] bridge0: port 2(bridge_slave_1) entered disabled state 01:22:43 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 520.785246] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_create1(0x0) r1 = gettid() epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000016) [ 520.812589] device bridge0 left promiscuous mode [ 520.833344] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.839828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 520.846488] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.852925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 520.865446] device bridge0 entered promiscuous mode 01:22:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 520.908608] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.915201] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.926620] device bridge0 left promiscuous mode [ 521.244117] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.250544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.257258] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.263699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.272745] device bridge0 entered promiscuous mode [ 521.558557] device bridge_slave_1 left promiscuous mode [ 521.564102] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.598926] device bridge_slave_0 left promiscuous mode [ 521.604441] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.658504] team0 (unregistering): Port device team_slave_1 removed [ 521.668602] team0 (unregistering): Port device team_slave_0 removed [ 521.681199] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 521.731839] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 521.788312] bond0 (unregistering): Released all slaves [ 522.100009] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.106476] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.113958] device bridge_slave_0 entered promiscuous mode [ 522.157550] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.164225] bridge0: port 2(bridge_slave_1) entered disabled state [ 522.171971] device bridge_slave_1 entered promiscuous mode [ 522.214458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 522.257920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 522.388542] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 522.434239] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 522.479063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 522.485938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 522.530546] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 522.537422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 522.666858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 522.674445] team0: Port device team_slave_0 added [ 522.716470] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 522.724071] team0: Port device team_slave_1 added [ 522.767302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 522.813056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 522.858844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 522.865974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 522.882950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 522.920946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 522.928128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 522.940343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 523.287925] bridge0: port 2(bridge_slave_1) entered blocking state [ 523.294297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 523.300961] bridge0: port 1(bridge_slave_0) entered blocking state [ 523.307315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 523.314801] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 523.468121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 524.246769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 524.338439] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 524.431308] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 524.437447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 524.444814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 524.532539] 8021q: adding VLAN 0 to HW filter on device team0 01:22:47 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:47 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = dup2(r0, r0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x40030000000000}, 0x0) 01:22:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000), 0x0, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:47 executing program 0: r0 = socket$inet(0x2, 0xa, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xfffff000}, 0x0) 01:22:47 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000), 0x0, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:47 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 525.176957] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.183553] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.249683] device bridge0 left promiscuous mode 01:22:47 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:47 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x0, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 525.726510] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.733427] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.741248] device bridge0 left promiscuous mode [ 525.752072] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.758583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 525.765307] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.772300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 525.779296] device bridge0 entered promiscuous mode [ 525.785298] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 525.793328] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.800196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 525.808060] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.815027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 525.825228] device bridge0 entered promiscuous mode 01:22:48 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = dup2(r0, r0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:48 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x0, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 01:22:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x3000000}, 0x0) 01:22:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000), 0x0, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:48 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:48 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 526.027828] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.034510] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:48 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf0}, 0x0) 01:22:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x17, 0x14, 0x0, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) [ 526.088427] device bridge0 left promiscuous mode 01:22:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:48 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 526.473126] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.479660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.486301] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.492865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.499760] device bridge0 entered promiscuous mode [ 526.505367] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 526.512514] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.519013] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.531159] device bridge0 left promiscuous mode [ 526.541281] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.548148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.556118] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.563042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.575352] device bridge0 entered promiscuous mode 01:22:49 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = dup2(r0, r0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x18, 0x14, 0x5}, 0x18}}, 0x0) 01:22:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:49 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x7501000000000000}, 0x0) 01:22:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 526.728918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:22:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) [ 526.774231] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.780835] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x18, 0x14, 0x5}, 0x18}}, 0x0) 01:22:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf0ffffff00000000}, 0x0) 01:22:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 526.832581] device bridge0 left promiscuous mode 01:22:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 527.238335] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.244830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.251586] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.258025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 527.264806] device bridge0 entered promiscuous mode [ 527.274889] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.282110] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.298515] device bridge0 left promiscuous mode [ 527.344137] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.350698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.357339] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.363844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 527.401792] device bridge0 entered promiscuous mode 01:22:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xffffff7f00000000}, 0x0) 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x18, 0x14, 0x5}, 0x18}}, 0x0) 01:22:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000), &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:50 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = dup2(r0, r0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:50 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf0ffffffffffff}, 0x0) [ 527.581609] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.588259] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.617051] device bridge0 left promiscuous mode 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:50 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = dup2(r0, r0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 528.221034] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.227506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.234423] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.241042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.248350] device bridge0 entered promiscuous mode [ 528.255161] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.261984] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.269197] device bridge0 left promiscuous mode [ 528.280385] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.287091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.295088] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.302362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.314649] device bridge0 entered promiscuous mode [ 528.328953] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 528.340112] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.347965] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.356620] device bridge0 left promiscuous mode [ 528.416583] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.423052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.429780] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.436626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.444163] device bridge0 entered promiscuous mode [ 529.337995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:22:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000), &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:53 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:53 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = dup2(r0, r0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000340)=""/62) 01:22:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xffffff7f}, 0x0) 01:22:53 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000}, {0x0, 0x3f}, @cond=[{0x8, 0x9, 0x2585cee6, 0x1, 0xffff, 0x9}, {0x0, 0x0, 0x1000, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = dup2(r0, r0) r4 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r5 = syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in=@dev}}}, &(0x7f00000007c0)=0xe8) getegid() openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000340)=""/62) 01:22:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 530.598167] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.604811] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.613721] device bridge0 left promiscuous mode 01:22:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 531.068657] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.075704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.082570] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.089001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.095800] device bridge0 entered promiscuous mode [ 531.101884] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 531.110504] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.117933] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.138323] device bridge0 left promiscuous mode [ 531.168160] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.174606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.181963] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.188443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.195298] device bridge0 entered promiscuous mode [ 531.202691] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.216703] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.227622] device bridge0 left promiscuous mode [ 531.281968] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.288586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.295208] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.301672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.312834] device bridge0 entered promiscuous mode [ 532.138017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:22:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000), &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 01:22:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:56 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:56 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x50400) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000003c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r2 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x1ff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000500)={r3, 0xba, "9117d4b4d7345d1b4754b457a96f6416cacc9dbc85445d4caf7c8bfc2fd43bce171baf84005f5c013f28ff91c2e84d3b8b9f961c53c4f26007b5bc1addf51557aa17735308e15835f3e82083f1aa7ed18667a3b4b1d5e3d86826d6b9678addd1dc3f36602b7f43505f2cdb31d3c1a5bad7ded4b28817428ff4304f1af94c57143e4655bd7fa459d2bcc27345b39dc1ef3e9b3a8a3c41d8019a7f9963bceba115e50e70c5fb4ad1966d55821df6700bebbc1b64e4d5317873bc28"}, &(0x7f00000002c0)=0xc2) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x3, @multicast1}, 0x53) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 01:22:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x1000000}, 0x0) 01:22:56 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x50400) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000003c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r2 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x1ff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000500)={r3, 0xba, "9117d4b4d7345d1b4754b457a96f6416cacc9dbc85445d4caf7c8bfc2fd43bce171baf84005f5c013f28ff91c2e84d3b8b9f961c53c4f26007b5bc1addf51557aa17735308e15835f3e82083f1aa7ed18667a3b4b1d5e3d86826d6b9678addd1dc3f36602b7f43505f2cdb31d3c1a5bad7ded4b28817428ff4304f1af94c57143e4655bd7fa459d2bcc27345b39dc1ef3e9b3a8a3c41d8019a7f9963bceba115e50e70c5fb4ad1966d55821df6700bebbc1b64e4d5317873bc28"}, &(0x7f00000002c0)=0xc2) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x3, @multicast1}, 0x53) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) [ 533.690494] bridge0: port 2(bridge_slave_1) entered disabled state [ 533.697029] bridge0: port 1(bridge_slave_0) entered disabled state 01:22:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x400300}, 0x0) 01:22:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 534.561550] device bridge0 left promiscuous mode 01:22:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:57 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x50400) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000003c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r2 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x1ff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000500)={r3, 0xba, "9117d4b4d7345d1b4754b457a96f6416cacc9dbc85445d4caf7c8bfc2fd43bce171baf84005f5c013f28ff91c2e84d3b8b9f961c53c4f26007b5bc1addf51557aa17735308e15835f3e82083f1aa7ed18667a3b4b1d5e3d86826d6b9678addd1dc3f36602b7f43505f2cdb31d3c1a5bad7ded4b28817428ff4304f1af94c57143e4655bd7fa459d2bcc27345b39dc1ef3e9b3a8a3c41d8019a7f9963bceba115e50e70c5fb4ad1966d55821df6700bebbc1b64e4d5317873bc28"}, &(0x7f00000002c0)=0xc2) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x3, @multicast1}, 0x53) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 01:22:57 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 534.980666] attempt to access beyond end of device [ 534.985670] loop1: rw=1, want=114, limit=112 [ 535.005465] attempt to access beyond end of device [ 535.010884] loop3: rw=1, want=114, limit=112 [ 535.018364] Buffer I/O error on dev loop1, logical block 113, lost async page write [ 535.030711] Buffer I/O error on dev loop3, logical block 113, lost async page write [ 535.045475] attempt to access beyond end of device [ 535.052889] attempt to access beyond end of device [ 535.061257] loop1: rw=1, want=115, limit=112 [ 535.068003] loop3: rw=1, want=115, limit=112 [ 535.074775] Buffer I/O error on dev loop1, logical block 114, lost async page write [ 535.082064] Buffer I/O error on dev loop3, logical block 114, lost async page write [ 535.085362] attempt to access beyond end of device [ 535.091254] attempt to access beyond end of device [ 535.095580] bridge0: port 2(bridge_slave_1) entered blocking state [ 535.101102] loop3: rw=1, want=116, limit=112 [ 535.106820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 535.106988] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.112734] Buffer I/O error on dev loop3, logical block 115, lost async page write [ 535.117879] bridge0: port 1(bridge_slave_0) entered forwarding state [ 535.124668] attempt to access beyond end of device [ 535.132455] loop1: rw=1, want=116, limit=112 [ 535.139065] loop3: rw=1, want=117, limit=112 [ 535.143539] Buffer I/O error on dev loop1, logical block 115, lost async page write [ 535.143578] attempt to access beyond end of device [ 535.148538] Buffer I/O error on dev loop3, logical block 116, lost async page write [ 535.152547] loop1: rw=1, want=117, limit=112 [ 535.160937] attempt to access beyond end of device [ 535.165342] Buffer I/O error on dev loop1, logical block 116, lost async page write [ 535.165378] attempt to access beyond end of device [ 535.173792] loop3: rw=1, want=130, limit=112 [ 535.177881] device bridge0 entered promiscuous mode [ 535.183577] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 535.190787] loop1: rw=1, want=130, limit=112 [ 535.196160] attempt to access beyond end of device [ 535.200150] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 535.200183] attempt to access beyond end of device [ 535.200193] loop1: rw=1, want=131, limit=112 [ 535.200221] attempt to access beyond end of device [ 535.205738] loop3: rw=1, want=131, limit=112 [ 535.213924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 535.218150] attempt to access beyond end of device [ 535.238227] loop1: rw=1, want=132, limit=112 [ 535.241329] loop3: rw=1, want=132, limit=112 [ 535.246058] attempt to access beyond end of device [ 535.250193] attempt to access beyond end of device [ 535.274831] loop3: rw=1, want=133, limit=112 [ 535.279274] loop1: rw=1, want=133, limit=112 [ 535.284239] attempt to access beyond end of device [ 535.298871] loop1: rw=1, want=4237, limit=112 [ 535.317409] attempt to access beyond end of device [ 535.319255] attempt to access beyond end of device [ 535.329759] loop1: rw=1, want=8333, limit=112 [ 535.332752] loop3: rw=1, want=4237, limit=112 [ 535.342818] attempt to access beyond end of device [ 535.347773] loop1: rw=1, want=12429, limit=112 [ 535.348828] attempt to access beyond end of device [ 535.357782] loop3: rw=1, want=8333, limit=112 [ 535.360234] attempt to access beyond end of device [ 535.367275] loop1: rw=1, want=16525, limit=112 [ 535.372777] attempt to access beyond end of device [ 535.377798] loop3: rw=1, want=12429, limit=112 [ 535.379462] attempt to access beyond end of device [ 535.387376] loop1: rw=1, want=20621, limit=112 [ 535.391787] attempt to access beyond end of device [ 535.397740] loop3: rw=1, want=16525, limit=112 [ 535.399321] attempt to access beyond end of device [ 535.407320] loop1: rw=1, want=24717, limit=112 [ 535.411115] attempt to access beyond end of device [ 535.417173] loop3: rw=1, want=20621, limit=112 [ 535.419418] attempt to access beyond end of device [ 535.426751] loop1: rw=1, want=28813, limit=112 [ 535.430491] attempt to access beyond end of device [ 535.436603] loop3: rw=1, want=24717, limit=112 [ 535.439363] attempt to access beyond end of device [ 535.446202] loop1: rw=1, want=32885, limit=112 [ 535.449372] attempt to access beyond end of device [ 535.455740] loop3: rw=1, want=28813, limit=112 [ 535.468519] attempt to access beyond end of device [ 535.473478] loop3: rw=1, want=32885, limit=112 [ 536.398045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 536.459648] attempt to access beyond end of device [ 536.464687] loop1: rw=1, want=114, limit=112 [ 536.469264] attempt to access beyond end of device [ 536.474201] loop1: rw=1, want=115, limit=112 [ 536.478697] attempt to access beyond end of device [ 536.483633] loop1: rw=1, want=116, limit=112 [ 536.488184] attempt to access beyond end of device [ 536.493178] loop1: rw=1, want=117, limit=112 [ 536.497615] attempt to access beyond end of device [ 536.502601] loop1: rw=1, want=130, limit=112 [ 536.507024] attempt to access beyond end of device [ 536.512704] loop1: rw=1, want=131, limit=112 [ 536.517137] attempt to access beyond end of device [ 536.522130] loop1: rw=1, want=132, limit=112 [ 536.526555] attempt to access beyond end of device [ 536.531578] loop1: rw=1, want=133, limit=112 [ 536.539420] attempt to access beyond end of device [ 536.544350] loop1: rw=1, want=4237, limit=112 [ 536.551029] attempt to access beyond end of device [ 536.555955] loop1: rw=1, want=4757, limit=112 [ 536.560836] attempt to access beyond end of device [ 536.565769] loop1: rw=1, want=4758, limit=112 [ 536.570325] attempt to access beyond end of device [ 536.575265] loop1: rw=1, want=4759, limit=112 [ 536.580045] attempt to access beyond end of device [ 536.584971] loop1: rw=1, want=4760, limit=112 [ 536.589529] attempt to access beyond end of device [ 536.594472] loop1: rw=1, want=4761, limit=112 [ 536.599109] attempt to access beyond end of device [ 536.604038] loop1: rw=1, want=4790, limit=112 [ 536.608608] attempt to access beyond end of device [ 536.613538] loop1: rw=1, want=4791, limit=112 [ 536.618231] attempt to access beyond end of device [ 536.623164] loop1: rw=1, want=4792, limit=112 [ 536.627674] attempt to access beyond end of device [ 536.632712] loop1: rw=1, want=4793, limit=112 [ 536.637256] attempt to access beyond end of device [ 536.642927] loop1: rw=1, want=4814, limit=112 [ 536.647435] attempt to access beyond end of device [ 536.652403] loop1: rw=1, want=4815, limit=112 01:22:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:22:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) 01:22:59 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:22:59 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x50400) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000003c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r2 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x1ff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000500)={r3, 0xba, "9117d4b4d7345d1b4754b457a96f6416cacc9dbc85445d4caf7c8bfc2fd43bce171baf84005f5c013f28ff91c2e84d3b8b9f961c53c4f26007b5bc1addf51557aa17735308e15835f3e82083f1aa7ed18667a3b4b1d5e3d86826d6b9678addd1dc3f36602b7f43505f2cdb31d3c1a5bad7ded4b28817428ff4304f1af94c57143e4655bd7fa459d2bcc27345b39dc1ef3e9b3a8a3c41d8019a7f9963bceba115e50e70c5fb4ad1966d55821df6700bebbc1b64e4d5317873bc28"}, &(0x7f00000002c0)=0xc2) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x3, @multicast1}, 0x53) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 01:22:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x2000000}, 0x0) 01:22:59 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x50400) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000003c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet_smc(0x2b, 0x1, 0x0) r2 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x1ff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000500)={r3, 0xba, "9117d4b4d7345d1b4754b457a96f6416cacc9dbc85445d4caf7c8bfc2fd43bce171baf84005f5c013f28ff91c2e84d3b8b9f961c53c4f26007b5bc1addf51557aa17735308e15835f3e82083f1aa7ed18667a3b4b1d5e3d86826d6b9678addd1dc3f36602b7f43505f2cdb31d3c1a5bad7ded4b28817428ff4304f1af94c57143e4655bd7fa459d2bcc27345b39dc1ef3e9b3a8a3c41d8019a7f9963bceba115e50e70c5fb4ad1966d55821df6700bebbc1b64e4d5317873bc28"}, &(0x7f00000002c0)=0xc2) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x3, @multicast1}, 0x53) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) [ 536.656913] attempt to access beyond end of device [ 536.661879] loop1: rw=1, want=4816, limit=112 [ 536.666388] attempt to access beyond end of device [ 536.671354] loop1: rw=1, want=4817, limit=112 [ 536.675881] attempt to access beyond end of device [ 536.681496] loop1: rw=1, want=4850, limit=112 [ 536.686711] attempt to access beyond end of device [ 536.708820] loop1: rw=1, want=4851, limit=112 [ 536.716410] attempt to access beyond end of device [ 536.769466] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.776012] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.783842] loop1: rw=1, want=4852, limit=112 [ 536.806824] attempt to access beyond end of device 01:22:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x3f000000}, 0x0) [ 536.859740] loop1: rw=1, want=4853, limit=112 01:22:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 536.896455] device bridge0 left promiscuous mode [ 536.911015] attempt to access beyond end of device [ 536.943653] loop1: rw=1, want=4866, limit=112 [ 537.003780] attempt to access beyond end of device [ 537.035706] loop1: rw=1, want=4867, limit=112 [ 537.040868] attempt to access beyond end of device [ 537.045941] loop1: rw=1, want=4868, limit=112 [ 537.050559] attempt to access beyond end of device [ 537.055500] loop1: rw=1, want=4869, limit=112 [ 537.060124] attempt to access beyond end of device [ 537.065066] loop1: rw=1, want=4878, limit=112 [ 537.069653] attempt to access beyond end of device [ 537.075113] loop1: rw=1, want=4879, limit=112 [ 537.079713] attempt to access beyond end of device 01:22:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 537.084654] loop1: rw=1, want=4880, limit=112 [ 537.089239] attempt to access beyond end of device [ 537.094174] loop1: rw=1, want=4881, limit=112 [ 537.104221] attempt to access beyond end of device [ 537.109684] loop1: rw=1, want=8977, limit=112 [ 537.122162] attempt to access beyond end of device [ 537.127110] loop1: rw=1, want=13073, limit=112 [ 537.139814] attempt to access beyond end of device [ 537.145295] loop1: rw=1, want=17169, limit=112 [ 537.158881] attempt to access beyond end of device [ 537.163845] loop1: rw=1, want=21265, limit=112 [ 537.176524] attempt to access beyond end of device [ 537.181557] loop1: rw=1, want=25361, limit=112 [ 537.207541] attempt to access beyond end of device [ 537.220076] loop1: rw=1, want=29457, limit=112 01:22:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 537.255944] attempt to access beyond end of device [ 537.268953] loop1: rw=1, want=32985, limit=112 01:22:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 537.769154] attempt to access beyond end of device [ 537.774141] loop3: rw=1, want=130, limit=112 [ 537.797962] attempt to access beyond end of device [ 537.809704] loop3: rw=1, want=131, limit=112 [ 537.824389] attempt to access beyond end of device [ 537.847944] loop3: rw=1, want=132, limit=112 [ 537.852416] attempt to access beyond end of device [ 537.867932] loop3: rw=1, want=133, limit=112 [ 537.872389] attempt to access beyond end of device [ 537.877320] loop3: rw=1, want=142, limit=112 [ 537.879264] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.888133] bridge0: port 2(bridge_slave_1) entered forwarding state 01:23:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) 01:23:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000014c0), 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 537.894799] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.897902] attempt to access beyond end of device [ 537.901214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.906073] loop3: rw=1, want=143, limit=112 [ 537.912858] device bridge0 entered promiscuous mode [ 537.931021] attempt to access beyond end of device [ 537.937376] loop3: rw=1, want=144, limit=112 [ 537.942262] attempt to access beyond end of device [ 537.947503] loop3: rw=1, want=145, limit=112 [ 537.957659] attempt to access beyond end of device [ 537.963069] loop3: rw=1, want=4241, limit=112 01:23:00 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x175}, 0x0) [ 538.003890] attempt to access beyond end of device [ 538.015955] loop3: rw=1, want=5849, limit=112 [ 538.046647] attempt to access beyond end of device [ 538.052393] loop3: rw=1, want=5878, limit=112 [ 538.057207] attempt to access beyond end of device [ 538.072279] loop3: rw=1, want=5879, limit=112 [ 538.079660] attempt to access beyond end of device [ 538.084645] loop3: rw=1, want=5880, limit=112 [ 538.089254] attempt to access beyond end of device [ 538.094188] loop3: rw=1, want=5881, limit=112 [ 538.098767] attempt to access beyond end of device [ 538.103705] loop3: rw=1, want=5902, limit=112 [ 538.108687] attempt to access beyond end of device [ 538.114714] loop3: rw=1, want=5903, limit=112 [ 538.122269] attempt to access beyond end of device [ 538.131349] loop3: rw=1, want=5904, limit=112 [ 538.144633] attempt to access beyond end of device [ 538.149763] loop3: rw=1, want=5905, limit=112 [ 538.157056] attempt to access beyond end of device [ 538.162394] loop3: rw=1, want=5954, limit=112 [ 538.166992] attempt to access beyond end of device [ 538.167006] loop3: rw=1, want=5955, limit=112 [ 538.167028] attempt to access beyond end of device [ 538.167036] loop3: rw=1, want=5956, limit=112 [ 538.186917] attempt to access beyond end of device [ 538.192047] loop3: rw=1, want=5957, limit=112 [ 538.196648] attempt to access beyond end of device [ 538.201745] loop3: rw=1, want=5966, limit=112 [ 538.206340] attempt to access beyond end of device [ 538.211455] loop3: rw=1, want=5967, limit=112 [ 538.216073] attempt to access beyond end of device [ 538.221175] loop3: rw=1, want=5968, limit=112 [ 538.225852] attempt to access beyond end of device [ 538.230967] loop3: rw=1, want=5969, limit=112 [ 538.242423] attempt to access beyond end of device [ 538.247387] loop3: rw=1, want=10065, limit=112 [ 538.259966] attempt to access beyond end of device [ 538.264924] loop3: rw=1, want=14161, limit=112 [ 538.277754] attempt to access beyond end of device [ 538.282757] loop3: rw=1, want=18257, limit=112 [ 538.295554] attempt to access beyond end of device [ 538.301259] loop3: rw=1, want=22353, limit=112 [ 538.314151] attempt to access beyond end of device [ 538.319252] loop3: rw=1, want=26449, limit=112 [ 538.332006] attempt to access beyond end of device [ 538.336966] loop3: rw=1, want=29993, limit=112 01:23:01 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$pptp(0x18, 0x1, 0x2) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 01:23:01 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:23:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xffffff9e}, 0x0) 01:23:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xfffffffffffff000}, 0x0) 01:23:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:01 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x7, 0xceaf, 0x0, 0x7ff, 0x0, 0x0, 0x800, 0x0, 0x1, 0x400, 0x4, 0x2, 0x9, 0x6, 0x4, 0x100000000, 0x9, 0x9, 0x0, 0x1, 0x6, 0x100, 0x6, 0x4, 0x0, 0x0, 0x1, 0x1, 0xf77, 0x0, 0x73, 0x8000, 0xfffffffeffffffff, 0x415, 0x0, 0x2, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000280), 0xf}, 0x4, 0x1, 0x6, 0x3, 0x0, 0x100000001, 0x9}, 0x0, 0x0, r0, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0), 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)=0x0) capset(&(0x7f0000000480)={0x200f1526, r3}, &(0x7f00000006c0)={0xfff, 0x0, 0x6, 0x3ff, 0x0, 0x6}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000001940)={0x7b, 0x0, [0x9, 0xffffffffffffffff, 0x3, 0x4]}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3bb41b46440117d598e23107bc3cc6a581e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)=0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000001880)=""/180) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) fchown(r1, r4, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r6, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa00000000000000, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r7 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') tkill(r7, 0x401104000000016) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x4, 0x9, @scatter={0x4, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}]}, &(0x7f0000001a00)="90e63d21", &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) [ 538.759781] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.766348] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.777207] device bridge0 left promiscuous mode 01:23:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) [ 538.914278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:23:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 01:23:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:01 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:02 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:23:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c3) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 01:23:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18}, 0x18) 01:23:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x200000000000000}, 0x0) [ 539.465747] bridge0: port 2(bridge_slave_1) entered blocking state [ 539.472206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 539.478946] bridge0: port 1(bridge_slave_0) entered blocking state [ 539.485324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 539.492494] device bridge0 entered promiscuous mode 01:23:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x40000000}, 0x0) [ 539.619279] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.625865] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.651298] device bridge0 left promiscuous mode 01:23:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x0) 01:23:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) 01:23:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) 01:23:02 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 540.198476] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.205544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.212307] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.218750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.228936] device bridge0 entered promiscuous mode 01:23:02 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 540.337782] bridge0: port 2(bridge_slave_1) entered disabled state [ 540.344834] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.355854] device bridge0 left promiscuous mode [ 540.765305] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.771773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.778534] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.784922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.829838] device bridge0 entered promiscuous mode 01:23:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x7ff}, 0x1c) 01:23:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x3f00}, 0x0) 01:23:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r0, 0x5502) 01:23:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x0) 01:23:04 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:23:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x7501}, 0x0) [ 541.545219] input: syz1 as /devices/virtual/input/input7 01:23:04 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) write(r0, &(0x7f0000000040)="2400000058001f02ff07f4f9002304000a04f51110000100020100020800028001000000", 0x24) 01:23:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x34000}, 0x0) [ 541.667268] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 541.692563] input: syz1 as /devices/virtual/input/input8 01:23:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x2000000000000000}, 0x0) 01:23:04 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x0, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:23:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000014c0)={0x0, 0xb3, 0x101}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000440)=ANY=[], 0x0) clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a4a000), &(0x7f00007c4000)) clone(0x0, &(0x7f0000000540)="e943a97da759a3b9f53968f12dc8fa7e63900631fa85a32c4cf72cb57d8a97210fa943f1b18a1a08c66f8104ebbb3c4c3eaa902224acdd9b4ff0c8bcea26dad404b6f1fcfe4172c0640611574ef02dbe80f2325c00d2a83772ac5d8e0ea50ce664a18e8dddb68f0fdd72c531e44625d149efddabd60e24ce59745d98c5d037a22d6749fb8332dee179377380939a60822605c156a690c657a1a939b5da705566dbf226eab08841c65febdbb03c54013d0dae309a311cf618e02b9945e89f1553869984bc2a7dcf0b8fc02da22d3a48c8ad55bbab5d0fc44612959f83", &(0x7f00000001c0), &(0x7f0000000380), &(0x7f00000000c0)) wait4(0x0, 0x0, 0x80000000, &(0x7f0000a94f70)) wait4(0x0, &(0x7f0000000100), 0x40000002, 0x0) socket(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r1, r0, 0x0, 0xa, &(0x7f00000003c0)='selfppp13\x00'}, 0x30) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000100)=""/189) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffffe) 01:23:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:04 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000100)=@md0='/dev/md0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='vfat\x00', 0x0, 0x0) [ 541.975789] FAT-fs (md0): unable to read boot sector 01:23:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = gettid() epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0xdfa8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x0) 01:23:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xffffffff00000000}, 0x0) 01:23:04 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:23:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2e, &(0x7f0000001040)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=0xfffffffffffffffe, {[@timestamp={0x44, 0x4}]}}, @igmp}}}}, 0x0) 01:23:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x2e, 0x6, 0x0, {0x1, 0x0, 0x5, 0x0, 'fuse\x00'}}, 0x2e) 01:23:04 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 01:23:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x9effffff}, 0x0) 01:23:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003580), 0x1000) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 01:23:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf000}, 0x0) 01:23:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000780)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x80f, 0x7, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@un=@abs={0x1}, 0x4b, &(0x7f0000000480), 0x0, &(0x7f0000000500)}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000340)) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000580)={"6e72300100", 0x802}) sendmsg(r3, &(0x7f0000000100)={&(0x7f0000000000)=@l2={0x1f, 0x1, {0x6, 0xffff, 0x80, 0x4, 0xfffffffffffffb0e, 0x80000000}, 0x1fffffffc0, 0x7}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000880)="6909547603e099b39aa194a5281edb9a671698923ef148e58ed4ad7c4388fc7a80fcb836329fda62b49ba1ab364c385c31f44de743368c82b75593a5417d7dfba6cbde4c4121d13ffba5b6e9baa5d964adc016f2f844000d536c45351fd70f76d987f67d49269238e9b34bdc520b5327155bfa", 0x73}], 0x1, &(0x7f0000000940)=ANY=[], 0x0, 0x1}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x0, 0x8000000000009, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl$TUNSETLINK(r4, 0x400454cd, 0x40000308) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', r5}, 0x10) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f00000005c0)=""/181) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000480)="dc2717b24845d7824f66af0ccb24194c2716aa4683cf3c2c265d2100"}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) 01:23:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 01:23:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x300}, 0x0) 01:23:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x100000000000000}, 0x0) 01:23:05 executing program 5: munmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() r0 = getpgrp(0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000240)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:23:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) keyctl$set_timeout(0xf, 0x0, 0x1) sendto$inet6(r0, &(0x7f00000004c0)="d3", 0x1, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) gettid() setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 01:23:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 543.380000] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.387214] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.396630] device bridge0 left promiscuous mode 01:23:05 executing program 3: 01:23:05 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x4000000000000000}, 0x0) 01:23:06 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000780)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x80f, 0x7, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@un=@abs={0x1}, 0x4b, &(0x7f0000000480), 0x0, &(0x7f0000000500)}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000340)) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000580)={"6e72300100", 0x802}) sendmsg(r3, &(0x7f0000000100)={&(0x7f0000000000)=@l2={0x1f, 0x1, {0x6, 0xffff, 0x80, 0x4, 0xfffffffffffffb0e, 0x80000000}, 0x1fffffffc0, 0x7}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000880)="6909547603e099b39aa194a5281edb9a671698923ef148e58ed4ad7c4388fc7a80fcb836329fda62b49ba1ab364c385c31f44de743368c82b75593a5417d7dfba6cbde4c4121d13ffba5b6e9baa5d964adc016f2f844000d536c45351fd70f76d987f67d49269238e9b34bdc520b5327155bfa", 0x73}], 0x1, &(0x7f0000000940)=ANY=[], 0x0, 0x1}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x0, 0x8000000000009, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) ioctl$TUNSETLINK(r4, 0x400454cd, 0x40000308) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', r5}, 0x10) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f00000005c0)=""/181) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000480)="dc2717b24845d7824f66af0ccb24194c2716aa4683cf3c2c265d2100"}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) 01:23:06 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x80ffff, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xffe3, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x1000, &(0x7f0000000100)="c73e3bcb400a8ad77a6fe27cbf8b", &(0x7f0000000180)=""/4096}, 0x28) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) 01:23:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) recvmmsg(r1, &(0x7f0000003d80)=[{{0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f0000001880)=""/126, 0x7e}}], 0x1, 0x0, &(0x7f0000003f40)={0x0, 0x989680}) 01:23:06 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:23:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) 01:23:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x4000}, 0x0) 01:23:06 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 01:23:06 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:23:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x60, &(0x7f00000001c0)='(\\self}&keyringsecurity\x00') 01:23:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xfffffff0}, 0x0) 01:23:06 executing program 1: 01:23:06 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x2}, 0x0) 01:23:06 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge0\x00'}) 01:23:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x40) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000440)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000006c0)=""/117, &(0x7f0000000280)=0xfffffffffffffdea) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, r0, 0x0, 0xa, &(0x7f00000003c0)='selfppp13\x00'}, 0x30) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000300)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 01:23:07 executing program 1: 01:23:07 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf00000000000000}, 0x0) 01:23:07 executing program 5: 01:23:07 executing program 1: 01:23:07 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:07 executing program 3: 01:23:07 executing program 0: 01:23:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf0ffff}, 0x0) 01:23:07 executing program 5: 01:23:07 executing program 1: 01:23:07 executing program 0: 01:23:07 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:07 executing program 3: 01:23:07 executing program 5: 01:23:07 executing program 0: 01:23:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x75010000}, 0x0) 01:23:07 executing program 1: 01:23:07 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:07 executing program 0: 01:23:07 executing program 3: 01:23:07 executing program 5: 01:23:07 executing program 1: 01:23:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf00}, 0x0) 01:23:07 executing program 5: 01:23:07 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:07 executing program 3: 01:23:07 executing program 0: 01:23:07 executing program 3: 01:23:07 executing program 1: 01:23:07 executing program 5: 01:23:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf}, 0x0) 01:23:07 executing program 1: 01:23:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40) ioctl$VT_DISALLOCATE(r1, 0x5608) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000014c0)={0x15}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000440)=ANY=[], 0x0) clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a4a000), &(0x7f00007c4000)) clone(0x0, &(0x7f0000000540)="e943a97da759a3b9f53968f12dc8fa7e63900631fa85a32c4cf72cb57d8a97210fa943f1b18a1a08c66f8104ebbb3c4c3eaa902224acdd9b4ff0c8bcea26dad404b6f1fcfe4172c0640611574ef02dbe80f2325c00d2a83772ac5d8e0ea50ce664a18e8dddb68f0fdd72c531e44625d149efddabd60e24ce59745d98c5d037a22d6749fb8332dee179377380939a60822605c156a690c657a1a939b5da705566dbf226eab08841c65febdbb03c54013d0dae309a311cf618e02b9945e89f1553869984bc2a7dcf0b8fc02da22d3a48c8ad55bbab5d0fc44612959f833d6c604ac33b030de760703007927a68adde056d83", &(0x7f00000001c0), &(0x7f0000000380), &(0x7f00000000c0)) wait4(0x0, 0x0, 0x80000000, &(0x7f0000a94f70)) wait4(0x0, &(0x7f0000000100), 0x40000002, 0x0) r3 = socket(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f00000006c0)=""/117, &(0x7f0000000280)=0xfffffffffffffdea) r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000480)='/dev/loop-control\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r4, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000003c0)='selfppp13\x00', r5}, 0x30) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000100)=""/189) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffffe) 01:23:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '.'}}, 0x22) 01:23:07 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x300000000000000}, 0x0) 01:23:08 executing program 3: 01:23:08 executing program 0: 01:23:08 executing program 3: 01:23:08 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:08 executing program 1: 01:23:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x9effffff00000000}, 0x0) 01:23:08 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:08 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000400)={'nat\x00'}, &(0x7f0000000480)=0x78) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000140)=""/237, &(0x7f0000000240)=0xed) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x1ff) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="00000000001d0100082c000200217b266c6f6c6f2e7621f9ffffff7662000000000000000000684ab8a160222c1bfbcfd8009200000000"], 0x1}}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r3, &(0x7f0000000300)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0xb) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) 01:23:08 executing program 1: 01:23:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0xc001, @multicast2}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x800) 01:23:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x20000000}, 0x0) 01:23:08 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:08 executing program 5: 01:23:08 executing program 3: 01:23:08 executing program 3: 01:23:08 executing program 1: 01:23:08 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) 01:23:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0xf000000}, 0x0) 01:23:08 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:08 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 01:23:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001900010200000000000000001d0100082c000200217b266c6f6c6f2e7621285d76626f786e65743123bf5e5b00000000000000000000000000000000"], 0x1}}, 0x0) 01:23:08 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002061f001cfffd946fa2830020200a000900010006e70000000aa3a20404ff7e", 0x24}], 0x1}, 0x0) 01:23:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="02180000100000000000000000000000080012000000000000000900000000aef71e540001de94bc0000000000000000e000000100000000000000265bac760700000000000000000000000000000000030006001600000002002000ac14ffbb000000000000000003000500000000000200003db28dbebb0000000000000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 01:23:08 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) 01:23:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x2000}, 0x0) 01:23:08 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 546.361487] netlink: 'syz-executor1': attribute type 1 has an invalid length. 01:23:08 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) 01:23:09 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) [ 546.414885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 01:23:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x2000}, 0x0) 01:23:09 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x2000012c, &(0x7f0000000a00)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r0) 01:23:09 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xffffff9e}, 0x0) [ 546.628514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 546.644793] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 01:23:09 executing program 1: pipe(&(0x7f0000030500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) dup3(r0, r1, 0x100) 01:23:09 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000300)=[{r0}], 0x1, 0x0) 01:23:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x2}, 0x0) 01:23:09 executing program 1: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x4, &(0x7f0000000700)=[0x0, r1, r1, r1]) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev, 0x3f}}, 0x0, 0x0, 0x0, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) socket$packet(0x11, 0x0, 0x300) 01:23:09 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) 01:23:09 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf00000000000000}, 0x0) 01:23:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000100)=""/17, 0x11, 0x0) 01:23:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x2d, &(0x7f0000000000)={@mcast2, 0x0, 0x1}, 0x20) 01:23:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 01:23:09 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) fcntl$setstatus(r0, 0x4, 0x42800) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x10001, 0x0, 0x0, 0x46}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x0, 0x0, 0x4}, 0xb) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x98) 01:23:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:10 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x3000000}, 0x0) 01:23:10 executing program 1: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x4, &(0x7f0000000700)=[0x0, r1, r1, r1]) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev, 0x3f}}, 0x0, 0x0, 0x0, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) socket$packet(0x11, 0x0, 0x300) 01:23:10 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0) 01:23:10 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) fcntl$setstatus(r0, 0x4, 0x42800) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x10001, 0x0, 0x0, 0x46}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x0, 0x0, 0x4}, 0xb) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x98) 01:23:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x2000000}, 0x0) 01:23:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) keyctl$describe(0x4, 0x0, &(0x7f0000000240)=""/140, 0x8c) 01:23:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) 01:23:10 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 01:23:10 executing program 3: unshare(0x20400) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000a1efac)=[{}], 0x1, 0x0, &(0x7f0000bbfff8), 0x8) 01:23:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:10 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:11 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) mknod$loop(&(0x7f0000000ac0)='./file0\x00', 0x0, 0x0) 01:23:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0x44, 0x0, 0x4, [0x0, 0x0, 0x20000100], 0x0, &(0x7f00000000c0), &(0x7f00000011c0)=ANY=[@ANYBLOB="00008960"]}, 0x7c) 01:23:11 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 01:23:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x3f000000}, 0x0) 01:23:11 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket(0x10, 0x3, 0xc) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000100)=ANY=[]}}, 0x0) dup2(r2, r0) 01:23:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf000000}, 0x0) 01:23:11 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 549.036246] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 01:23:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x2000000000a1}]}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00005c8000)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65c856a45d61154adc2b2a976fbffffffffffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x81, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000000)="9c", 0x1, 0x0, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10) exit(0x0) writev(r0, &(0x7f000042a000)=[{&(0x7f00001e3f5a)='-', 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000240)="9b", 0x1, 0x0, 0x0, 0x0) [ 549.115231] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 549.131081] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 01:23:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x10001, 0x0, 0x0, 0x46}, 0x98) 01:23:12 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x40000000}, 0x0) 01:23:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf000}, 0x0) 01:23:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf00}, 0x0) 01:23:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x8, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast1}}}, 0x108) 01:23:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote, @rand_addr}, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:23:13 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r2, r2, r2, r1, r2]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r4, 0xa, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={@mcast2}) 01:23:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x4000}, 0x0) 01:23:13 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:13 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:13 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 01:23:13 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 01:23:13 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:14 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) fcntl$setsig(r3, 0xa, 0x7) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:14 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x40030000000000}, 0x0) 01:23:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:14 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:14 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:14 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x7501000000000000}, 0x0) 01:23:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:14 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 01:23:14 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:14 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:14 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x20000000}, 0x0) 01:23:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xfffffff0}, 0x0) 01:23:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:15 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x200000000000000}, 0x0) 01:23:15 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:15 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xfffff000}, 0x0) 01:23:15 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x9effffff}, 0x0) 01:23:15 executing program 3: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 01:23:15 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xffffff7f}, 0x0) 01:23:16 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x3}, 0x0) 01:23:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:16 executing program 3: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) fadvise64(r0, 0x0, 0x0, 0x0) 01:23:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x2000000000000000}, 0x0) 01:23:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:16 executing program 3: unshare(0x20400) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 01:23:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x300000000000000}, 0x0) 01:23:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:17 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6}, 0x98) 01:23:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf0ffffff}, 0x0) 01:23:17 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 01:23:17 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x400300}, 0x0) 01:23:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:17 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:18 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 01:23:18 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) 01:23:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:18 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000100)) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) 01:23:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x4000000000000000}, 0x0) 01:23:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf0ffff}, 0x0) 01:23:19 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) socketpair$inet(0x2, 0x2, 0x1, &(0x7f0000000280)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000100)) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) 01:23:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x7501}, 0x0) 01:23:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x300}, 0x0) 01:23:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000100)) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) 01:23:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:19 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf}, 0x0) 01:23:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000100)) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) 01:23:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf0}, 0x0) 01:23:20 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) setgroups(0x6, &(0x7f0000000700)=[0x0, r1, r1, r1, r0, r1]) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000100)) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x3f00}, 0x0) 01:23:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x175}, 0x0) 01:23:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:20 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x0, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x34000}, 0x0) 01:23:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x100000000000000}, 0x0) 01:23:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x0, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/17, 0x11, 0x0) 01:23:21 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 01:23:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x0, 0x8, 0x0, 'group_id'}}, 0x29) 01:23:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:21 executing program 3: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) preadv(r0, &(0x7f0000001680), 0x0, 0x0) 01:23:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:21 executing program 5: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x20400) close(r0) fremovexattr(r0, &(0x7f0000000040)=@known='user.syz\x00') 01:23:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x75010000}, 0x0) 01:23:21 executing program 3: rt_sigpending(0xffffffffffffffff, 0x0) 01:23:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x1000000}, 0x0) 01:23:22 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) getgid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000140)=0x100, 0xfd50) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:22 executing program 3: unshare(0x20400) r0 = socket(0x10, 0x803, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 01:23:22 executing program 5: r0 = memfd_create(&(0x7f0000000000)="132d766d6e65743100", 0x0) unshare(0x4000600) close(r0) signalfd(r0, &(0x7f0000000040), 0x8) 01:23:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 01:23:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x10001, 0x0, 0x0, 0x46}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x98) 01:23:22 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) getgid() r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 01:23:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:22 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) setsockopt$sock_attach_bpf(r1, 0x1, 0x25, &(0x7f0000000140)=r2, 0x1f4) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f00000003c0)=@in6={0x2, 0x4e20, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)}, 0x0) recvmsg$kcm(r1, &(0x7f0000001900)={&(0x7f0000000700)=@hci, 0x80, &(0x7f00000018c0)}, 0x2060) 01:23:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 01:23:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 01:23:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="390000001300090468fe0704000000000000ff3f03000000450001070000001419001a0015000a00070008000000005d14a4e91ee438000000", 0x39}], 0x1) 01:23:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x175}, 0x0) 01:23:22 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 560.391091] netlink: 'syz-executor3': attribute type 8 has an invalid length. [ 560.415611] netlink: 9 bytes leftover after parsing attributes in process `syz-executor3'. [ 560.424860] netlink: 9 bytes leftover after parsing attributes in process `syz-executor3'. 01:23:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) 01:23:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x802fffffffe}, 0xc) r1 = socket(0x200000000010, 0x2, 0x0) write(r1, &(0x7f000095c000)="2400000026007f000000000000007701000000ff0100000000000000ffffffff0100ff10", 0x24) 01:23:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 01:23:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 01:23:23 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/13, 0x6a}], 0x1) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000940)={@in6={{0xa, 0x4e22, 0x2c44, @dev={0xfe, 0x80, [], 0xd}, 0x3f}}, 0x9, 0x6, 0x3f, "3dfa8a9fbba86abda72693e3077c16b6456e5a103b620b583a19cca0a0fd91a71ada9b68e829b9882156682c70485b11535bc8e7e0159dc54476930ce96332e8b31fe07b5ec4d28383945730bcfb79bd"}, 0xd8) nanosleep(&(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)={'nat\x00'}, &(0x7f0000000500)=0x54) 01:23:23 executing program 3: munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = accept4(0xffffffffffffffff, &(0x7f00000004c0)=@generic, &(0x7f0000000540)=0x80, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r2, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x800}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) 01:23:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) 01:23:23 executing program 3: fchmod(0xffffffffffffffff, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000001200), 0x4) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000280)='attr/prev\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getpid() write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="4103af7d01"], 0x5) 01:23:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:23 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) set_mempolicy(0x4003, &(0x7f0000000000)=0x7fffffff, 0x6) mount(&(0x7f0000000300)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ubifs\x00', 0x0, &(0x7f0000000140)='adfs\x00') 01:23:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x75010000}, 0x0) 01:23:23 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0xa, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000002c0)=""/191, 0x0, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) 01:23:23 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140), 0x20) 01:23:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x5, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 561.241960] kasan: CONFIG_KASAN_INLINE enabled [ 561.248265] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 561.256151] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 561.262404] CPU: 1 PID: 29903 Comm: syz-executor5 Not tainted 4.19.0-rc4-next-20180920+ #76 [ 561.271351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.280730] RIP: 0010:ubifs_mount+0x1b5/0x75fe [ 561.285321] Code: ff ff e8 4e e4 01 ff 49 81 ff 00 f0 ff ff 0f 86 fe 03 00 00 e8 0c e3 01 ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 93 1a 00 00 [ 561.304872] RSP: 0018:ffff88018d0cf620 EFLAGS: 00010246 [ 561.310703] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90002e66000 [ 561.317971] RDX: 0000000000000000 RSI: ffffffff827b6ce4 RDI: 0000000000000007 [ 561.325240] RBP: ffff88018d0cfb88 R08: ffff8801995d4280 R09: ffffed003b5a5b57 [ 561.332508] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: 0000000000000000 [ 561.339776] R13: ffffffff89990a60 R14: ffff88018d0cfb60 R15: ffffffffffffffea [ 561.347049] FS: 00007f49986dc700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 561.355719] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 561.357906] kobject: 'loop2' (000000002c4df941): kobject_uevent_env [ 561.361595] CR2: 0000000000706158 CR3: 00000001ce243000 CR4: 00000000001406e0 [ 561.361608] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 561.361616] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 561.361621] Call Trace: [ 561.361639] ? find_held_lock+0x36/0x1c0 [ 561.361659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.368242] kobject: 'loop2' (000000002c4df941): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 561.375307] ? should_fail+0x22d/0xd01 [ 561.375326] ? lock_downgrade+0x900/0x900 [ 561.375341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 561.375365] ? graph_lock+0x170/0x170 [ 561.428419] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 561.433696] ? rcu_softirq_qs+0x20/0x20 [ 561.437667] ? ubifs_iget+0x1c20/0x1c20 [ 561.441643] ? find_held_lock+0x36/0x1c0 [ 561.445700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.451266] ? check_preemption_disabled+0x48/0x200 [ 561.456267] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 561.461951] ? rcu_pm_notify+0xc0/0xc0 [ 561.465836] ? rcu_read_lock_sched_held+0x108/0x120 [ 561.470859] ? __alloc_pages_nodemask+0xbf1/0xdd0 [ 561.475733] ? find_held_lock+0x36/0x1c0 [ 561.479778] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 561.484774] ? cache_grow_end+0xa8/0x190 [ 561.488815] ? lock_downgrade+0x900/0x900 [ 561.492960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.498595] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 561.504205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.509727] ? check_preemption_disabled+0x48/0x200 [ 561.514724] ? __this_cpu_preempt_check+0x1c/0x1f [ 561.519550] ? __inc_numa_state+0x49/0xd0 [ 561.523679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.529200] ? alloc_page_interleave+0x91/0x1c0 [ 561.533859] ? ubifs_iget+0x1c20/0x1c20 [ 561.537821] legacy_get_tree+0x131/0x460 [ 561.541885] vfs_get_tree+0x1cb/0x5c0 [ 561.545755] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 561.550494] do_mount+0x70c/0x1db0 [ 561.554139] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 561.559672] ? copy_mount_string+0x40/0x40 [ 561.563891] ? copy_mount_options+0x5f/0x430 [ 561.568366] ? kmem_cache_alloc_trace+0x353/0x750 [ 561.573203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.578724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.584252] ? copy_mount_options+0x315/0x430 [ 561.588729] ksys_mount+0x12d/0x140 [ 561.592354] __x64_sys_mount+0xbe/0x150 [ 561.596317] do_syscall_64+0x1b9/0x820 [ 561.600195] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 561.605647] ? syscall_return_slowpath+0x5e0/0x5e0 [ 561.610560] ? trace_hardirqs_off+0x310/0x310 [ 561.615040] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 561.620039] ? recalc_sigpending_tsk+0x180/0x180 [ 561.624778] ? kasan_check_write+0x14/0x20 [ 561.628999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 561.633914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.639086] RIP: 0033:0x457679 [ 561.642265] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.661146] RSP: 002b:00007f49986dbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 561.668835] RAX: ffffffffffffffda RBX: 00007f49986dc6d4 RCX: 0000000000457679 [ 561.676091] RDX: 00000000200000c0 RSI: 00000000200002c0 RDI: 0000000020000300 [ 561.683360] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 561.690620] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 561.697878] R13: 00000000004d3b58 R14: 00000000004c297a R15: 0000000000000000 [ 561.705130] Modules linked in: [ 561.710606] ---[ end trace 19ea43a393b90aad ]--- [ 561.715390] RIP: 0010:ubifs_mount+0x1b5/0x75fe [ 561.720023] Code: ff ff e8 4e e4 01 ff 49 81 ff 00 f0 ff ff 0f 86 fe 03 00 00 e8 0c e3 01 ff 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 48 89 da 83 e2 07 38 d0 7f 08 84 c0 0f 85 93 1a 00 00 [ 561.739471] RSP: 0018:ffff88018d0cf620 EFLAGS: 00010246 [ 561.744825] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90002e66000 [ 561.752193] RDX: 0000000000000000 RSI: ffffffff827b6ce4 RDI: 0000000000000007 [ 561.759492] RBP: ffff88018d0cfb88 R08: ffff8801995d4280 R09: ffffed003b5a5b57 [ 561.766750] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: 0000000000000000 [ 561.774051] R13: ffffffff89990a60 R14: ffff88018d0cfb60 R15: ffffffffffffffea [ 561.781356] FS: 00007f49986dc700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 561.789621] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 561.795493] CR2: 0000000000625208 CR3: 00000001ce243000 CR4: 00000000001406e0 [ 561.802797] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 561.810089] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 561.817340] Kernel panic - not syncing: Fatal exception [ 561.824073] Kernel Offset: disabled [ 561.827694] Rebooting in 86400 seconds..