er parsing attributes in process `syz-executor.1'. [ 292.774406][ T9149] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.782930][ T9149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.797437][ T9149] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.806271][ T9149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.821982][ T9149] device bridge0 left promiscuous mode 08:19:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) [ 293.057985][ T9153] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.065618][ T9153] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.073414][ T9153] device bridge0 entered promiscuous mode [ 293.234968][ T9156] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 293.249764][ T9156] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.259615][ T9156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.273700][ T9156] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.282985][ T9156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.304151][ T9156] device bridge0 left promiscuous mode 08:19:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 293.625829][ T9161] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.633323][ T9161] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.641436][ T9161] device bridge0 entered promiscuous mode [ 293.839037][ T9163] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 293.853782][ T9163] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.863436][ T9163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.877164][ T9163] bridge0: port 1(bridge_slave_0) entered blocking state 08:19:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) [ 293.887095][ T9163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.907554][ T9163] device bridge0 left promiscuous mode [ 294.162096][ T9169] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.169772][ T9169] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.177458][ T9169] device bridge0 entered promiscuous mode 08:19:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 294.299416][ T9170] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 294.314322][ T9170] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.323288][ T9170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.337112][ T9170] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.346702][ T9170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.359977][ T9170] device bridge0 left promiscuous mode [ 294.436923][ T33] audit: type=1400 audit(1595060358.927:10): avc: denied { execmem } for pid=9171 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 08:19:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 294.678962][ T9174] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.686675][ T9174] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.694425][ T9174] device bridge0 entered promiscuous mode [ 294.854596][ T9175] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 294.869022][ T9175] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.876578][ T9175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.888376][ T9175] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.896598][ T9175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.910839][ T9175] device bridge0 left promiscuous mode 08:19:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) [ 295.265207][ T9179] IPVS: ftp: loaded support on port[0] = 21 [ 295.300670][ T9183] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.308327][ T9183] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.316041][ T9183] device bridge0 entered promiscuous mode 08:19:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) dup(0xffffffffffffffff) [ 295.555700][ T9185] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 295.570912][ T9185] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.579505][ T9185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.590930][ T9185] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.598509][ T9185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.620952][ T9185] device bridge0 left promiscuous mode [ 295.857325][ T9212] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.864947][ T9212] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.872713][ T9212] device bridge0 entered promiscuous mode [ 296.011730][ T9213] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 296.025838][ T9213] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.034226][ T9213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.046034][ T9213] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.055057][ T9213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.071151][ T9213] device bridge0 left promiscuous mode 08:19:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) [ 296.353784][ T9179] chnl_net:caif_netlink_parms(): no params data found [ 296.585807][ T9309] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.593360][ T9309] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.601217][ T9309] device bridge0 entered promiscuous mode 08:19:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) dup(0xffffffffffffffff) [ 296.808477][ T9179] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.815832][ T9179] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.825361][ T9179] device bridge_slave_0 entered promiscuous mode [ 296.835625][ T9320] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 296.849273][ T9320] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.856806][ T9320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.871139][ T9320] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.880387][ T9320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.897372][ T9320] device bridge0 left promiscuous mode [ 296.964266][ T9179] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.971506][ T9179] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.981119][ T9179] device bridge_slave_1 entered promiscuous mode [ 297.023325][ T9323] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.030878][ T9323] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.038671][ T9323] device bridge0 entered promiscuous mode [ 297.209340][ T9324] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 297.223966][ T9324] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.233963][ T9324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.247871][ T9324] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.256398][ T9324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.292506][ T9324] device bridge0 left promiscuous mode 08:19:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) dup(0xffffffffffffffff) 08:19:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 297.492473][ T9179] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.532572][ T9179] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 297.616583][ T9179] team0: Port device team_slave_0 added [ 297.630103][ T9179] team0: Port device team_slave_1 added [ 297.699433][ T9354] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.707231][ T9354] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.715339][ T9354] device bridge0 entered promiscuous mode [ 297.834743][ T9179] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 297.841818][ T9179] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 297.868079][ T9179] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 297.880875][ T9355] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 297.897737][ T9355] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.906202][ T9355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.917830][ T9355] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.925998][ T9355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.942396][ T9355] device bridge0 left promiscuous mode [ 298.015754][ T9361] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.023506][ T9361] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.031059][ T9361] device bridge0 entered promiscuous mode [ 298.294157][ T9362] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 298.312729][ T9362] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.321873][ T9362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.335544][ T9362] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.345456][ T9362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.366366][ T9362] device bridge0 left promiscuous mode 08:19:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 298.516571][ T9179] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 298.523749][ T9179] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 298.551508][ T9179] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 08:19:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 298.754591][ T9179] device hsr_slave_0 entered promiscuous mode [ 298.794566][ T9179] device hsr_slave_1 entered promiscuous mode [ 298.823757][ T9179] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 298.831393][ T9179] Cannot create hsr debugfs directory [ 298.840808][ T9372] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.848405][ T9372] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.856131][ T9372] device bridge0 entered promiscuous mode [ 299.063389][ T9379] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 299.075948][ T9379] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.085485][ T9379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.099363][ T9379] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.107416][ T9379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.130171][ T9379] device bridge0 left promiscuous mode [ 299.241567][ T9387] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.249240][ T9387] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.257019][ T9387] device bridge0 entered promiscuous mode [ 299.437433][ T9389] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 299.454848][ T9389] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.463169][ T9389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.479263][ T9389] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.488130][ T9389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.501445][ T9389] device bridge0 left promiscuous mode 08:19:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:19:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 299.886253][ T9422] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.893911][ T9422] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.902083][ T9422] device bridge0 entered promiscuous mode [ 300.139182][ T9423] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 300.152175][ T9423] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.161210][ T9423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.173256][ T9423] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.183175][ T9423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.206210][ T9423] device bridge0 left promiscuous mode [ 300.427236][ T9179] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 300.472362][ T9179] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 300.512108][ T9179] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 300.573419][ T9179] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 300.839044][ T9179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.893525][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.902423][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.921876][ T9179] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.943264][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.954718][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.964175][ T9021] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.971378][ T9021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.028983][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 301.038094][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.048777][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.058081][ T9021] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.066342][ T9021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.075393][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 301.086084][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.096849][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 301.107118][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.117383][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.127585][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.170075][ T9179] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.180957][ T9179] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.240674][ T9179] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.378163][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.387919][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.397463][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.407954][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.417458][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.426907][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.434670][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.442342][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 301.452609][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.462491][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 301.471862][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.487233][ T9179] device veth0_vlan entered promiscuous mode [ 301.551754][ T9179] device veth1_vlan entered promiscuous mode [ 301.604109][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.613407][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.622311][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.631973][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 301.641331][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 301.677668][ T9179] device veth0_macvtap entered promiscuous mode [ 301.707512][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 301.716950][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.729628][ T9179] device veth1_macvtap entered promiscuous mode [ 301.766072][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 301.775833][ T9179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 301.786954][ T9179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.797102][ T9179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 301.808756][ T9179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.822092][ T9179] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 301.836306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 301.846451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.869767][ T9179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 301.880361][ T9179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.890374][ T9179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 301.901653][ T9179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 301.915164][ T9179] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 301.928893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 301.938597][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.533285][ T9474] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.541382][ T9474] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.549897][ T9474] device bridge0 entered promiscuous mode [ 302.683985][ T9475] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 302.700180][ T9475] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.707769][ T9475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.722644][ T9475] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.733080][ T9475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.756037][ T9475] device bridge0 left promiscuous mode 08:19:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:19:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 303.429823][ T9483] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.437819][ T9483] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.446365][ T9483] device bridge0 entered promiscuous mode [ 303.702052][ T9484] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.709861][ T9484] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.717702][ T9484] device bridge0 entered promiscuous mode [ 303.918324][ T9486] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.926706][ T9486] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.935478][ T9486] device bridge0 entered promiscuous mode [ 304.082929][ T9487] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 304.097473][ T9487] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.106323][ T9487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.119958][ T9487] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.128676][ T9487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.142787][ T9487] device bridge0 left promiscuous mode [ 304.155517][ T9490] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 304.168478][ T9490] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.176068][ T9490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.187078][ T9490] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.196254][ T9490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.205950][ T9490] device bridge0 left promiscuous mode 08:19:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:19:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 304.656097][ T9502] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.663719][ T9502] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.671985][ T9502] device bridge0 entered promiscuous mode [ 304.976371][ T9503] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.984060][ T9503] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.991529][ T9503] device bridge0 entered promiscuous mode [ 305.298808][ T9504] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 305.313418][ T9504] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.321515][ T9504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.332277][ T9504] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.341862][ T9504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.362487][ T9504] device bridge0 left promiscuous mode [ 305.434731][ T9505] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 305.445389][ T9505] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.452779][ T9505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.460635][ T9505] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.468032][ T9505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.476260][ T9505] device bridge0 left promiscuous mode 08:19:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) 08:19:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 305.807887][ T9515] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 305.822752][ T9515] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.830977][ T9515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.844640][ T9515] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.852290][ T9515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.865852][ T9515] device bridge0 left promiscuous mode [ 306.086213][ T9522] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.093850][ T9522] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.101435][ T9522] device bridge0 entered promiscuous mode [ 306.358970][ T9523] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.366773][ T9523] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.374975][ T9523] device bridge0 entered promiscuous mode 08:19:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 306.653643][ T9524] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 306.668556][ T9524] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.677619][ T9524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.691448][ T9524] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.700905][ T9524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.715321][ T9524] device bridge0 left promiscuous mode [ 306.806003][ T9525] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 306.815892][ T9525] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.823238][ T9525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.831090][ T9525] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.838499][ T9525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.847657][ T9525] device bridge0 left promiscuous mode [ 306.858462][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.874593][ T9531] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.882199][ T9531] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.891176][ T9531] device bridge0 entered promiscuous mode 08:19:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 307.104446][ T9533] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 307.118373][ T9533] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.126828][ T9533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.139854][ T9533] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.147359][ T9533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.178227][ T9533] device bridge0 left promiscuous mode 08:19:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) [ 307.458174][ T9540] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.465794][ T9540] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.473530][ T9540] device bridge0 entered promiscuous mode 08:19:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 307.773611][ T9542] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 307.787480][ T9542] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.795897][ T9542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.811046][ T9542] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.819759][ T9542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.834240][ T9542] device bridge0 left promiscuous mode [ 308.064882][ T9544] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.072739][ T9544] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.080423][ T9544] device bridge0 entered promiscuous mode 08:19:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 308.363998][ T9546] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 308.373867][ T9546] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.381127][ T9546] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.389144][ T9546] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.396462][ T9546] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.404649][ T9546] device bridge0 left promiscuous mode [ 308.428751][ T9551] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.436550][ T9551] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.446556][ T9551] device bridge0 entered promiscuous mode [ 308.697671][ T9552] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 308.708023][ T9552] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.715554][ T9552] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.723525][ T9552] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.730775][ T9552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.739674][ T9552] device bridge0 left promiscuous mode 08:19:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) [ 308.896242][ T9560] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.903873][ T9560] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.912056][ T9560] device bridge0 entered promiscuous mode 08:19:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 309.240158][ T9564] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.247877][ T9564] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.255621][ T9564] device bridge0 entered promiscuous mode 08:19:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 309.442240][ T9566] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 309.457824][ T9566] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.467845][ T9566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.480889][ T9566] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.489210][ T9566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.507329][ T9566] device bridge0 left promiscuous mode [ 309.631704][ T9571] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.639182][ T9571] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.647225][ T9571] device bridge0 entered promiscuous mode [ 309.792177][ T9572] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 309.806326][ T9572] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.815234][ T9572] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.829691][ T9572] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.839801][ T9572] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.859603][ T9572] device bridge0 left promiscuous mode 08:19:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 310.231084][ T9585] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.238781][ T9585] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.246582][ T9585] device bridge0 entered promiscuous mode [ 310.485293][ T9587] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.492900][ T9587] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.500579][ T9587] device bridge0 entered promiscuous mode 08:19:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 310.788146][ T9589] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 310.805064][ T9589] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.813053][ T9589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.826491][ T9589] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.836735][ T9589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.853320][ T9589] device bridge0 left promiscuous mode [ 310.921784][ T9588] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 310.932931][ T9588] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.941114][ T9588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.953288][ T9588] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.961482][ T9588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.969733][ T9588] device bridge0 left promiscuous mode 08:19:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) [ 311.342538][ T9600] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.350033][ T9600] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.357713][ T9600] device bridge0 entered promiscuous mode [ 311.687524][ T9604] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.695334][ T9604] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.703168][ T9604] device bridge0 entered promiscuous mode 08:19:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 311.897146][ T9603] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 311.911328][ T9603] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.921454][ T9603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.937373][ T9603] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.945145][ T9603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.973539][ T9603] device bridge0 left promiscuous mode [ 312.038146][ T9605] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 312.051233][ T9605] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.060539][ T9605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.073267][ T9605] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.082400][ T9605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.119178][ T9605] device bridge0 left promiscuous mode 08:19:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) [ 312.373391][ T9613] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 312.393812][ T9613] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.402090][ T9613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.414971][ T9613] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.423977][ T9613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.440767][ T9613] device bridge0 left promiscuous mode 08:19:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 312.670366][ T9621] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.678203][ T9621] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.685893][ T9621] device bridge0 entered promiscuous mode 08:19:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 313.233425][ T9622] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.241243][ T9622] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.248833][ T9622] device bridge0 entered promiscuous mode [ 313.431121][ T9623] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 313.441104][ T9623] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.448343][ T9623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.456427][ T9623] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.463748][ T9623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.472014][ T9623] device bridge0 left promiscuous mode [ 313.483694][ T9624] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 313.493414][ T9624] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.500644][ T9624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.508619][ T9624] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.516017][ T9624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.524241][ T9624] device bridge0 left promiscuous mode [ 313.535595][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.548087][ T9633] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 313.651466][ T9631] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.659092][ T9631] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.666855][ T9631] device bridge0 entered promiscuous mode 08:19:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 314.090006][ T9637] IPVS: ftp: loaded support on port[0] = 21 [ 314.145851][ T9641] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.153452][ T9641] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.161302][ T9641] device bridge0 entered promiscuous mode 08:19:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 314.504404][ T9643] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 314.517866][ T9643] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.525534][ T9643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.538471][ T9643] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.547069][ T9643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.561226][ T9643] device bridge0 left promiscuous mode [ 314.668482][ T9645] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.676201][ T9645] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.683896][ T9645] device bridge0 entered promiscuous mode [ 314.851376][ T9647] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 314.864072][ T9647] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.874163][ T9647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.889078][ T9647] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.896903][ T9647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.913111][ T9647] device bridge0 left promiscuous mode [ 314.999395][ T9653] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 315.022069][ T9653] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.034260][ T9653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.053402][ T9653] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.067639][ T9653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.089809][ T9653] device bridge0 left promiscuous mode 08:19:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 315.596500][ T9717] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.604118][ T9717] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.611900][ T9717] device bridge0 entered promiscuous mode 08:19:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 315.941877][ T9726] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 315.958430][ T9726] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.967047][ T9726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.980900][ T9726] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.992637][ T9726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.008363][ T9726] device bridge0 left promiscuous mode [ 316.095002][ T9690] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 316.183442][ T9732] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.191106][ T9732] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.199120][ T9732] device bridge0 entered promiscuous mode 08:19:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 316.504913][ T9730] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 316.514925][ T9730] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.522365][ T9730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.530223][ T9730] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.537563][ T9730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.545764][ T9730] device bridge0 left promiscuous mode [ 316.588536][ T9771] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.596330][ T9771] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.604714][ T9771] device bridge0 entered promiscuous mode 08:19:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 316.940886][ T9637] chnl_net:caif_netlink_parms(): no params data found [ 316.970892][ T9775] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 316.982896][ T9775] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.990653][ T9775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.002064][ T9775] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.010034][ T9775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.025520][ T9775] device bridge0 left promiscuous mode [ 317.231998][ T9780] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.239634][ T9780] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.247618][ T9780] device bridge0 entered promiscuous mode 08:19:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 317.609096][ T9781] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.616557][ T9781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.624541][ T9781] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.631864][ T9781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.640124][ T9781] device bridge0 left promiscuous mode [ 317.673455][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 317.851276][ T9788] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.858874][ T9788] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.866649][ T9788] device bridge0 entered promiscuous mode [ 318.000919][ T9790] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.008220][ T9790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.016265][ T9790] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.023676][ T9790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.031834][ T9790] device bridge0 left promiscuous mode [ 318.198527][ T9797] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.206107][ T9797] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.214304][ T9797] device bridge0 entered promiscuous mode [ 318.642496][ T9637] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.649748][ T9637] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.659571][ T9637] device bridge_slave_0 entered promiscuous mode [ 318.703519][ T9637] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.711028][ T9637] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.744491][ T9637] device bridge_slave_1 entered promiscuous mode [ 318.837468][ T9637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.876598][ T9637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 318.923174][ T9637] team0: Port device team_slave_0 added [ 318.935576][ T9637] team0: Port device team_slave_1 added [ 318.988880][ T9637] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 318.996131][ T9637] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 319.022330][ T9637] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 319.038660][ T9637] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 319.046076][ T9637] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 319.073106][ T9637] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 319.210232][ T9637] device hsr_slave_0 entered promiscuous mode [ 319.262204][ T9637] device hsr_slave_1 entered promiscuous mode [ 319.321812][ T9637] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 319.329451][ T9637] Cannot create hsr debugfs directory [ 319.637840][ T9637] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 319.691505][ T9637] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 319.745647][ T9637] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 319.823726][ T9637] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 320.047766][ T9637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.088037][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.097854][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.128781][ T9637] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.155882][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.165263][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.174981][ T9804] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.182281][ T9804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.253584][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.263139][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.273038][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.282325][ T9804] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.289504][ T9804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.298539][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.309436][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.320202][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.330610][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.340917][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.351255][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.361515][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.370995][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.389406][ T9637] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.402578][ T9637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.517956][ T9637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.544712][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.554377][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.565232][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.574903][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 320.582773][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 320.663870][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 320.674266][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.684329][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 320.693841][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.706467][ T9637] device veth0_vlan entered promiscuous mode [ 320.714334][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.723871][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.771802][ T9637] device veth1_vlan entered promiscuous mode [ 320.812353][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 320.821258][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 320.867967][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.877977][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.907208][ T9637] device veth0_macvtap entered promiscuous mode [ 320.945024][ T9637] device veth1_macvtap entered promiscuous mode [ 320.995042][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 321.005948][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.015967][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 321.026503][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.036484][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 321.047201][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.061080][ T9637] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 321.078990][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 321.088891][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 321.098255][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.108143][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.177629][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.188550][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.198618][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.209275][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.219402][ T9637] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.231896][ T9637] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.245619][ T9637] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 321.259134][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.269230][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.810359][ T9926] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.818521][ T9926] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.827337][ T9926] device bridge0 entered promiscuous mode [ 321.956393][ T9928] __nla_validate_parse: 2 callbacks suppressed [ 321.956479][ T9928] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 321.976112][ T9928] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.985610][ T9928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.998047][ T9928] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.008066][ T9928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.027153][ T9928] device bridge0 left promiscuous mode 08:19:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:19:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 322.720910][ T9936] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.728498][ T9936] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.736324][ T9936] device bridge0 entered promiscuous mode [ 322.996246][ T9938] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 323.011112][ T9938] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.019485][ T9938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.033679][ T9938] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.043371][ T9938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.061511][ T9938] device bridge0 left promiscuous mode [ 323.281829][ T9940] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.289839][ T9940] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.297440][ T9940] device bridge0 entered promiscuous mode 08:19:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 323.485674][ T9944] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 323.497025][ T9944] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.504486][ T9944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.512519][ T9944] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.519896][ T9944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.528062][ T9944] device bridge0 left promiscuous mode 08:19:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 323.758514][ T9945] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.766740][ T9945] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.775180][ T9945] device bridge0 entered promiscuous mode 08:19:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 324.105568][ T9950] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 324.115863][ T9950] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.123276][ T9950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.131292][ T9950] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.138641][ T9950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.146892][ T9950] device bridge0 left promiscuous mode [ 324.168557][ T9957] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.176425][ T9957] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.184092][ T9957] device bridge0 entered promiscuous mode 08:19:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 324.524069][ T9960] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 324.537475][ T9960] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.545047][ T9960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.558008][ T9960] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.565376][ T9960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.573555][ T9960] device bridge0 left promiscuous mode 08:19:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 324.753032][ T9967] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.760670][ T9967] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.768198][ T9967] device bridge0 entered promiscuous mode 08:19:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 325.009399][ T9968] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 325.019071][ T9968] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.026475][ T9968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.034506][ T9968] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.041886][ T9968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.050251][ T9968] device bridge0 left promiscuous mode [ 325.210909][ T9973] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.218576][ T9973] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.226538][ T9973] device bridge0 entered promiscuous mode 08:19:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 325.596257][ T9974] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 325.607141][ T9974] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.614549][ T9974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.622545][ T9974] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.629931][ T9974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.638000][ T9974] device bridge0 left promiscuous mode [ 325.663813][ T9981] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.695683][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.703827][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.716257][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.724027][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.739326][ T9981] device bridge0 left promiscuous mode [ 325.761839][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.774155][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.880345][ T9985] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.887922][ T9985] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.895675][ T9985] device bridge0 entered promiscuous mode 08:19:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 326.259255][ T9986] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 326.268959][ T9986] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.276390][ T9986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.284369][ T9986] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.291750][ T9986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.301049][ T9986] device bridge0 left promiscuous mode [ 326.490789][ T9991] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.498394][ T9991] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.506165][ T9991] device bridge0 entered promiscuous mode 08:19:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 326.676132][ T9993] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 326.686127][ T9993] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.693565][ T9993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.701523][ T9993] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.708772][ T9993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.717013][ T9993] device bridge0 left promiscuous mode [ 326.897446][T10000] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.905167][T10000] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.913004][T10000] device bridge0 entered promiscuous mode 08:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 327.348782][T10001] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.356435][T10001] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.364247][T10001] device bridge0 entered promiscuous mode [ 327.629753][T10002] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 327.639769][T10002] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.647010][T10002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.655083][T10002] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.662467][T10002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.670737][T10002] device bridge0 left promiscuous mode [ 327.682334][T10003] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 327.692144][T10003] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.699494][T10003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.707374][T10003] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.714760][T10003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.724477][T10003] device bridge0 left promiscuous mode 08:19:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 327.884063][T10010] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.891758][T10010] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.899422][T10010] device bridge0 entered promiscuous mode [ 328.273681][T10011] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 328.283503][T10011] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.290910][T10011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.298902][T10011] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.306149][T10011] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.314307][T10011] device bridge0 left promiscuous mode [ 328.330504][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.379307][T10016] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.386895][T10016] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.394584][T10016] device bridge0 entered promiscuous mode 08:19:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 328.824469][T10017] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 328.834349][T10017] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.841975][T10017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.849929][T10017] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.857191][T10017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.865583][T10017] device bridge0 left promiscuous mode 08:19:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 329.151667][T10024] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.159248][T10024] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.166788][T10024] device bridge0 entered promiscuous mode [ 329.477463][T10025] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.485142][T10025] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.492923][T10025] device bridge0 entered promiscuous mode [ 329.813750][T10028] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 329.823940][T10028] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.831346][T10028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.839274][T10028] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.846531][T10028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.854795][T10028] device bridge0 left promiscuous mode [ 329.865696][T10027] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 329.875904][T10027] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.883280][T10027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.891251][T10027] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.898487][T10027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.908095][T10027] device bridge0 left promiscuous mode [ 329.944943][T10037] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.952585][T10037] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.963524][T10037] device bridge0 entered promiscuous mode [ 330.123629][T10038] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 330.133560][T10038] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.140954][T10038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.148894][T10038] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.156135][T10038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.164413][T10038] device bridge0 left promiscuous mode 08:19:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 330.177810][T10043] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.187733][T10043] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.195355][T10043] device bridge0 entered promiscuous mode 08:19:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:19:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 330.592922][T10044] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 330.602839][T10044] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.610206][T10044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.618037][T10044] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.625422][T10044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.633653][T10044] device bridge0 left promiscuous mode [ 330.654282][T10050] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.661822][T10050] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.670995][T10050] device bridge0 entered promiscuous mode [ 331.049497][T10052] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 331.067567][T10052] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.076695][T10052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.093835][T10052] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.105573][T10052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.125629][T10052] device bridge0 left promiscuous mode 08:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 331.259811][T10047] IPVS: ftp: loaded support on port[0] = 21 [ 331.435413][T10058] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.443670][T10058] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.451583][T10058] device bridge0 entered promiscuous mode 08:19:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 331.737454][T10059] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 331.747270][T10059] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.754689][T10059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.762656][T10059] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.770037][T10059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.778463][T10059] device bridge0 left promiscuous mode 08:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 332.031748][T10064] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.039326][T10064] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.047562][T10064] device bridge0 entered promiscuous mode [ 332.374299][T10066] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.381676][T10066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.389724][T10066] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.396984][T10066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.405343][T10066] device bridge0 left promiscuous mode [ 332.497846][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.519931][T10072] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.527586][T10072] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.536145][T10072] device bridge0 entered promiscuous mode 08:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 332.788359][T10073] __nla_validate_parse: 1 callbacks suppressed [ 332.788391][T10073] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 332.804564][T10073] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.811929][T10073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.820668][T10073] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.828340][T10073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.836508][T10073] device bridge0 left promiscuous mode [ 332.853859][T10078] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.862859][T10078] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.870695][T10078] device bridge0 entered promiscuous mode 08:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 333.221658][T10079] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 333.231575][T10079] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.238949][T10079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.246785][T10079] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.254143][T10079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.262367][T10079] device bridge0 left promiscuous mode 08:19:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 333.496078][T10084] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.503926][T10084] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.511823][T10084] device bridge0 entered promiscuous mode [ 333.845896][T10085] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 333.855847][T10085] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.863264][T10085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.871140][T10085] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.878490][T10085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.886614][T10085] device bridge0 left promiscuous mode [ 333.912725][T10110] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.920434][T10110] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.929681][T10110] device bridge0 entered promiscuous mode [ 334.203068][T10111] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 334.212908][T10111] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.220287][T10111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.228252][T10111] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.235497][T10111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.243832][T10111] device bridge0 left promiscuous mode [ 334.446833][T10118] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.454588][T10118] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.463248][T10118] device bridge0 entered promiscuous mode [ 334.668187][T10119] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 334.677872][T10119] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.685377][T10119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.693337][T10119] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.700794][T10119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.709095][T10119] device bridge0 left promiscuous mode [ 334.725031][T10124] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.732672][T10124] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.740443][T10124] device bridge0 entered promiscuous mode [ 334.958799][T10126] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 334.968632][T10126] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.975881][T10126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.983927][T10126] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.991277][T10126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.999549][T10126] device bridge0 left promiscuous mode [ 335.247394][T10047] chnl_net:caif_netlink_parms(): no params data found [ 335.482796][T10047] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.490538][T10047] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.500121][T10047] device bridge_slave_0 entered promiscuous mode [ 335.552210][T10047] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.559601][T10047] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.569241][T10047] device bridge_slave_1 entered promiscuous mode [ 335.655994][T10047] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 335.688715][T10047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 335.749568][T10047] team0: Port device team_slave_0 added [ 335.762322][T10047] team0: Port device team_slave_1 added [ 335.809436][T10047] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 335.818220][T10047] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 335.844507][T10047] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 335.866662][T10047] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 335.873880][T10047] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 335.900837][T10047] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 336.014383][T10047] device hsr_slave_0 entered promiscuous mode [ 336.049900][T10047] device hsr_slave_1 entered promiscuous mode [ 336.159668][T10047] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 336.167608][T10047] Cannot create hsr debugfs directory [ 336.523680][T10047] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 336.655719][T10047] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 336.737072][T10047] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 336.789122][T10047] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 337.056781][T10047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.106441][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.115565][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.146593][T10047] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.173123][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.184084][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.193475][ T9576] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.200742][ T9576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.279889][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.289370][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.299700][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.309032][ T9576] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.316212][ T9576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.325377][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.336206][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.347104][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.357528][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.367694][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.378028][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.409397][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.419377][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.430557][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.439988][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.450296][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.467403][T10047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.547407][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 337.555711][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 337.587881][T10047] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.753776][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 337.763858][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.826532][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.836243][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.853541][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.863439][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.878088][T10047] device veth0_vlan entered promiscuous mode [ 337.934909][T10047] device veth1_vlan entered promiscuous mode [ 337.992346][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.002409][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 338.011825][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.021825][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.040519][T10047] device veth0_macvtap entered promiscuous mode [ 338.057642][T10047] device veth1_macvtap entered promiscuous mode [ 338.104085][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.117139][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.127237][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.138079][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.148043][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.158561][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.168513][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.179076][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.193060][T10047] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 338.205131][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 338.215360][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 338.224740][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 338.234678][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 338.296882][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 338.307544][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.317649][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 338.329053][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.339285][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 338.349804][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.359785][T10047] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 338.370320][T10047] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.384025][T10047] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 338.397296][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 338.407327][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.081802][T10344] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.089937][T10344] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.098164][T10344] device bridge0 entered promiscuous mode [ 339.281190][T10346] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 339.291126][T10346] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.298342][T10346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.306366][T10346] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.313772][T10346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.322410][T10346] device bridge0 left promiscuous mode 08:20:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 339.966426][T10352] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.974011][T10352] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.982023][T10352] device bridge0 entered promiscuous mode [ 340.223080][T10356] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.230917][T10356] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.238532][T10356] device bridge0 entered promiscuous mode [ 340.709296][T10355] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 340.720378][T10355] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.727645][T10355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.735714][T10355] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.743083][T10355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.751250][T10355] device bridge0 left promiscuous mode [ 340.762791][T10358] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 340.777424][T10358] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.785954][T10358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.798961][T10358] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.808933][T10358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.827727][T10358] device bridge0 left promiscuous mode [ 340.928577][T10361] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.936207][T10361] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.944088][T10361] device bridge0 entered promiscuous mode 08:20:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) [ 341.373554][T10360] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.381370][T10360] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.389141][T10360] device bridge0 entered promiscuous mode [ 341.659902][T10365] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 341.669807][T10365] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.677054][T10365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.685117][T10365] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.692476][T10365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.700946][T10365] device bridge0 left promiscuous mode [ 341.723916][T10363] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 341.734614][T10363] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.742079][T10363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.750371][T10363] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.757622][T10363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.765799][T10363] device bridge0 left promiscuous mode [ 341.783041][T10370] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.791250][T10370] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.798919][T10370] device bridge0 entered promiscuous mode 08:20:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 342.188017][T10372] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 342.197939][T10372] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.205340][T10372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.213316][T10372] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.220643][T10372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.229141][T10372] device bridge0 left promiscuous mode 08:20:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 342.469788][T10376] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.477413][T10376] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.485138][T10376] device bridge0 entered promiscuous mode 08:20:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 342.739313][T10378] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 342.749009][T10378] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.756820][T10378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.764755][T10378] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.772102][T10378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.780351][T10378] device bridge0 left promiscuous mode [ 343.013736][T10384] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.021437][T10384] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.029091][T10384] device bridge0 entered promiscuous mode 08:20:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 343.403598][T10383] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 343.413490][T10383] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.420923][T10383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.428766][T10383] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.436166][T10383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.446496][T10383] device bridge0 left promiscuous mode 08:20:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) [ 343.797079][T10390] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.804762][T10390] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.813065][T10390] device bridge0 entered promiscuous mode [ 344.139722][T10393] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 344.149654][T10393] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.156900][T10393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.164827][T10393] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.172374][T10393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.181004][T10393] device bridge0 left promiscuous mode [ 344.194973][T10395] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.202644][T10395] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.210239][T10395] device bridge0 entered promiscuous mode [ 344.449176][T10397] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 344.459121][T10397] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.466538][T10397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.474450][T10397] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.481803][T10397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.490183][T10397] device bridge0 left promiscuous mode 08:20:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 344.693721][T10402] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.701578][T10402] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.709341][T10402] device bridge0 entered promiscuous mode [ 344.917002][T10403] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 344.927233][T10403] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.934660][T10403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.942651][T10403] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.950005][T10403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.958170][T10403] device bridge0 left promiscuous mode [ 344.980899][T10408] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.988497][T10408] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.997272][T10408] device bridge0 entered promiscuous mode 08:20:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 345.259734][T10409] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 345.269415][T10409] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.276839][T10409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.284798][T10409] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.292157][T10409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.300538][T10409] device bridge0 left promiscuous mode [ 345.503694][T10415] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.511522][T10415] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.519330][T10415] device bridge0 entered promiscuous mode 08:20:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 345.716732][T10416] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 345.726612][T10416] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.733997][T10416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.741948][T10416] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.749200][T10416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.757484][T10416] device bridge0 left promiscuous mode [ 345.787326][T10419] IPVS: ftp: loaded support on port[0] = 21 [ 345.802009][T10424] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.809587][T10424] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.817306][T10424] device bridge0 entered promiscuous mode 08:20:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 346.082442][T10427] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 346.092515][T10427] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.099916][T10427] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.107930][T10427] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.115305][T10427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.124009][T10427] device bridge0 left promiscuous mode [ 346.322697][T10428] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.330394][T10428] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.338158][T10428] device bridge0 entered promiscuous mode 08:20:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 346.493039][T10429] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 346.502967][T10429] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.510416][T10429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.518257][T10429] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.525640][T10429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.534038][T10429] device bridge0 left promiscuous mode [ 346.556120][T10437] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.563807][T10437] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.572385][T10437] device bridge0 entered promiscuous mode 08:20:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 346.859952][T10438] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 346.869689][T10438] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.877356][T10438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.886331][T10438] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.893812][T10438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.902105][T10438] device bridge0 left promiscuous mode 08:20:11 executing program 4: [ 347.116421][T10446] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.124101][T10446] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.131868][T10446] device bridge0 entered promiscuous mode [ 347.403888][T10448] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.411580][T10448] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.419320][T10448] device bridge0 entered promiscuous mode 08:20:12 executing program 4: [ 347.683374][T10449] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 347.693278][T10449] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.700682][T10449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.708552][T10449] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.715898][T10449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.724155][T10449] device bridge0 left promiscuous mode [ 347.735511][T10450] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 347.745957][T10450] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.753443][T10450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.761406][T10450] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.768665][T10450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.776847][T10450] device bridge0 left promiscuous mode 08:20:12 executing program 4: 08:20:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 347.932801][T10459] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.940469][T10459] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.948106][T10459] device bridge0 entered promiscuous mode [ 348.251390][T10464] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 348.262237][T10464] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.269492][T10464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.277554][T10464] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.285021][T10464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.293263][T10464] device bridge0 left promiscuous mode [ 348.427385][T10483] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.435036][T10483] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.442657][T10483] device bridge0 entered promiscuous mode [ 348.705918][T10484] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.714898][T10484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.730621][T10484] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.740313][T10484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.767701][T10484] device bridge0 left promiscuous mode [ 349.243559][T10419] chnl_net:caif_netlink_parms(): no params data found [ 349.416973][T10419] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.424280][T10419] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.433924][T10419] device bridge_slave_0 entered promiscuous mode [ 349.445558][T10419] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.452997][T10419] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.463509][T10419] device bridge_slave_1 entered promiscuous mode [ 349.507466][T10419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 349.520756][T10419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 349.557106][T10419] team0: Port device team_slave_0 added [ 349.565972][T10419] team0: Port device team_slave_1 added [ 349.606727][T10419] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 349.614061][T10419] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 349.640504][T10419] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 349.656216][T10419] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 349.663537][T10419] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 349.690050][T10419] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 349.777009][T10419] device hsr_slave_0 entered promiscuous mode [ 349.844077][T10419] device hsr_slave_1 entered promiscuous mode [ 349.900487][T10419] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 349.908123][T10419] Cannot create hsr debugfs directory [ 350.122595][T10419] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 350.168973][T10419] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 350.216050][T10419] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 350.278801][T10419] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 350.359961][T10419] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.367286][T10419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.375154][T10419] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.382509][T10419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.403460][ T3079] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.414701][ T3079] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.512290][T10419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 350.534951][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.543870][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.562318][T10419] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.578415][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.587719][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.597238][ T4883] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.604561][ T4883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.638877][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.648850][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.658515][ T4883] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.665846][ T4883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.675626][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 350.686663][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 350.713706][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 350.723551][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 350.733814][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 350.744149][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 350.777507][T10419] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 350.788124][T10419] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 350.803167][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 350.812997][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 350.822970][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.833416][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.843118][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.884094][T10419] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 350.898457][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 350.909319][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 350.917387][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 351.007848][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 351.017758][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 351.060774][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 351.070970][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.089500][T10419] device veth0_vlan entered promiscuous mode [ 351.103166][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.111909][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.147609][T10419] device veth1_vlan entered promiscuous mode [ 351.186832][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 351.195908][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 351.205309][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 351.215207][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 351.234121][T10419] device veth0_macvtap entered promiscuous mode [ 351.248543][T10419] device veth1_macvtap entered promiscuous mode [ 351.279890][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.293250][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.303327][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.313936][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.324910][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.335495][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.345509][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.356121][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.366161][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 351.377015][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.389380][T10419] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 351.402008][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 351.411354][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 351.420292][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 351.431069][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 351.450071][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.460864][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.470885][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.481472][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.491691][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.502333][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.512396][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.523436][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.533485][T10419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 351.544099][T10419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 351.558134][T10419] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 351.573855][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 351.584217][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.025425][T10716] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.033213][T10716] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.041941][T10716] device bridge0 entered promiscuous mode [ 352.149827][T10716] __nla_validate_parse: 2 callbacks suppressed [ 352.149846][T10716] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 352.166918][T10716] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.174272][T10716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.182196][T10716] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.189425][T10716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.197577][T10716] device bridge0 left promiscuous mode 08:20:17 executing program 5: 08:20:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:17 executing program 4: 08:20:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 352.937482][T10728] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.945240][T10728] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.953700][T10728] device bridge0 entered promiscuous mode 08:20:17 executing program 4: 08:20:17 executing program 5: 08:20:17 executing program 4: 08:20:18 executing program 5: 08:20:18 executing program 4: [ 353.749004][T10727] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.756698][T10727] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.764593][T10727] device bridge0 entered promiscuous mode 08:20:18 executing program 5: 08:20:18 executing program 4: [ 354.249969][T10730] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.257670][T10730] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.265455][T10730] device bridge0 entered promiscuous mode [ 354.501081][T10731] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 354.510733][T10731] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.518162][T10731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.526193][T10731] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.533526][T10731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.541793][T10731] device bridge0 left promiscuous mode [ 354.561145][T10732] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 354.570964][T10732] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.578199][T10732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.586123][T10732] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.593443][T10732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.603866][T10732] device bridge0 left promiscuous mode [ 354.614928][T10729] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 354.628316][T10734] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 354.638732][T10734] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.646072][T10734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.653989][T10734] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.661324][T10734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.669427][T10734] device bridge0 left promiscuous mode 08:20:19 executing program 3: 08:20:19 executing program 5: 08:20:19 executing program 4: 08:20:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:19 executing program 4: 08:20:19 executing program 5: [ 355.214680][T10762] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.222281][T10762] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.229757][T10762] device bridge0 entered promiscuous mode 08:20:19 executing program 3: 08:20:20 executing program 4: 08:20:20 executing program 5: [ 355.711190][T10766] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 355.720910][T10766] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.728333][T10766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.736287][T10766] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.743607][T10766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.751825][T10766] device bridge0 left promiscuous mode [ 355.766921][T10769] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.774658][T10769] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.782648][T10769] device bridge0 entered promiscuous mode 08:20:20 executing program 3: 08:20:20 executing program 4: 08:20:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:20 executing program 5: [ 356.261295][T10765] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 356.272051][T10771] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 356.281784][T10771] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.289012][T10771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.296978][T10771] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.304285][T10771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.313117][T10771] device bridge0 left promiscuous mode 08:20:20 executing program 4: 08:20:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 356.487706][T10784] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.495332][T10784] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.503511][T10784] device bridge0 entered promiscuous mode 08:20:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:21 executing program 3: 08:20:21 executing program 5: 08:20:21 executing program 4: [ 357.054367][T10785] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 357.069787][T10785] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.078379][T10785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.094241][T10785] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.103637][T10785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.120505][T10785] device bridge0 left promiscuous mode 08:20:21 executing program 3: [ 357.212280][T10793] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 357.275804][T10800] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.283384][T10800] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.290910][T10800] device bridge0 entered promiscuous mode 08:20:21 executing program 5: 08:20:22 executing program 4: 08:20:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:22 executing program 3: 08:20:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:22 executing program 5: [ 357.872799][T10802] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 357.882996][T10802] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.890249][T10802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.898320][T10802] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.905721][T10802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.913900][T10802] device bridge0 left promiscuous mode [ 358.071246][T10813] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:22 executing program 4: [ 358.175012][T10814] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.182705][T10814] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.190848][T10814] device bridge0 entered promiscuous mode 08:20:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:22 executing program 3: 08:20:23 executing program 5: [ 358.602665][T10817] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 358.617257][T10817] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.625832][T10817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.637350][T10817] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.646168][T10817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.671869][T10817] device bridge0 left promiscuous mode 08:20:23 executing program 4: 08:20:23 executing program 3: [ 358.798817][T10825] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.806473][T10825] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.814552][T10825] device bridge0 entered promiscuous mode 08:20:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:23 executing program 5: 08:20:23 executing program 4: 08:20:23 executing program 3: 08:20:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 359.362723][T10826] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 359.372941][T10826] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.380205][T10826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.388259][T10826] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.395682][T10826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.404231][T10826] device bridge0 left promiscuous mode [ 359.423234][ T52] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.438395][T10834] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:24 executing program 5: 08:20:24 executing program 3: 08:20:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:24 executing program 4: [ 359.780456][T10840] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.788079][T10840] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.795982][T10840] device bridge0 entered promiscuous mode 08:20:24 executing program 5: 08:20:24 executing program 4: 08:20:24 executing program 3: 08:20:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 360.342303][T10842] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 360.356622][T10842] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.366135][T10842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.379171][T10842] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.388695][T10842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.403744][T10842] device bridge0 left promiscuous mode [ 360.481312][T10850] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:20:25 executing program 5: [ 360.630352][T10856] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:25 executing program 3: 08:20:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r3) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:25 executing program 4: 08:20:25 executing program 5: 08:20:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 361.149605][T10865] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:25 executing program 4: 08:20:25 executing program 3: [ 361.451476][T10873] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.459113][T10873] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.466876][T10873] device bridge0 entered promiscuous mode 08:20:26 executing program 5: 08:20:26 executing program 3: 08:20:26 executing program 4: [ 361.898818][T10875] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.907241][T10875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.921575][T10875] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.931056][T10875] bridge0: port 1(bridge_slave_0) entered forwarding state 08:20:26 executing program 5: [ 361.945816][T10875] device bridge0 left promiscuous mode 08:20:26 executing program 3: 08:20:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 362.448150][T10887] __nla_validate_parse: 2 callbacks suppressed [ 362.448186][T10887] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:27 executing program 4: 08:20:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:27 executing program 3: 08:20:27 executing program 5: 08:20:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:27 executing program 3: 08:20:27 executing program 5: [ 362.837302][T10896] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:20:27 executing program 4: [ 362.907449][T10898] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.915092][T10898] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.922926][T10898] device bridge0 entered promiscuous mode 08:20:27 executing program 3: 08:20:27 executing program 5: 08:20:27 executing program 4: [ 363.488704][T10901] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 363.504363][T10901] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.512357][T10901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.527000][T10901] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.535685][T10901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.552670][T10901] device bridge0 left promiscuous mode [ 363.583956][T10903] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:28 executing program 3: 08:20:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:28 executing program 4: 08:20:28 executing program 5: 08:20:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r1, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r2 = dup(r0) ioctl$RTC_IRQP_READ(r2, 0x8004700b, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r3, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:28 executing program 3: 08:20:28 executing program 4: 08:20:28 executing program 5: [ 364.210770][T10920] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 364.227505][T10921] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 364.349870][T10926] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.358254][T10926] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.365945][T10926] device bridge0 entered promiscuous mode 08:20:29 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r1, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r2 = dup(r0) ioctl$RTC_IRQP_READ(r2, 0x8004700b, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r3, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:29 executing program 4: 08:20:29 executing program 3: 08:20:29 executing program 5: [ 364.872432][T10928] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 364.893153][T10928] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.901712][T10928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.915555][T10928] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.925580][T10928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.941661][T10928] device bridge0 left promiscuous mode [ 365.007317][T10934] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(0xffffffffffffffff) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:29 executing program 3: 08:20:29 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r1, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r2 = dup(r0) ioctl$RTC_IRQP_READ(r2, 0x8004700b, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r3, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:29 executing program 4: 08:20:29 executing program 5: [ 365.484089][T10942] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 365.525928][T10946] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:30 executing program 3: 08:20:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x8, 0x4) listen(r0, 0x0) syz_emit_ethernet(0xad, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd6002820000770600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='P'], 0x0) 08:20:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r1) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 365.861233][T10953] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.868896][T10953] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.876992][T10953] device bridge0 entered promiscuous mode 08:20:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 08:20:30 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x488, 0x0, 0x5002004a, 0x0, 0x308, 0x0, 0x3f0, 0x3c8, 0x3c8, 0x3f0, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @empty, 0x0, 0x0, 'vlan0\x00', 'gretap0\x00'}, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf0={{0x230, 'bpf\x00'}, {0x0, [{0x7}, {0x3ff, 0x0, 0x8}, {0x0, 0x0, 0x3, 0xff}, {}, {0x6, 0x0, 0x2}, {0x0, 0x0, 0x0, 0xdf3}, {0x0, 0x1}, {0x8c}, {}, {0x0, 0x2}, {0x0, 0x0, 0x1}, {0x0, 0x20}, {0x0, 0x0, 0x3, 0x10001}, {0x0, 0x6, 0x9}, {0x0, 0x0, 0x9}, {0x0, 0x3, 0x5, 0x4}, {}, {}, {0x0, 0x5}, {0x0, 0x84}, {0x7, 0xfa, 0x9}, {0x0, 0x0, 0x3f, 0x7fff}, {0x0, 0x4}, {0x0, 0x7, 0x9}, {0x0, 0x0, 0x0, 0xffff8000}, {0x0, 0x0, 0x81}, {0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x8}, {0x4, 0x7a}, {0xfffc, 0x6, 0x0, 0x10001}, {0x9, 0x7f, 0x3, 0x9}, {0x40, 0x0, 0x40, 0x8}, {0x7f, 0x2, 0x6}, {0x40, 0xc1, 0x8, 0x9}, {0x4, 0x6, 0xd8, 0x40}, {0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x0, 0x3f, 0x0, 0x8}, {0x7}, {0x0, 0x4, 0x1, 0x4f}, {}, {}, {}, {}, {0x0, 0x0, 0xff}, {}, {}, {}, {}, {0x0, 0x5, 0x2, 0x10000}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3}]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0xa0, 0xe8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x4e8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) [ 366.220390][T10955] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.230818][T10955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.247585][T10955] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.256354][T10955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.274806][T10955] device bridge0 left promiscuous mode 08:20:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:31 executing program 3: r0 = memfd_create(&(0x7f0000000200)='G\x84\xe7R\xb5\xbc\xeal\x01\x86\x01\xff\xff\xff\xff\x00\x00\x00\x00\x1bX\x93\xbbqz\x01o\x81\xa6\x02Wq\x8c\xbfx\xdd\xd4\xf1\aQu8\x99:\x06\xb9\xbe\f&Ws\x83\xd6&s3\v7n0Oj\xff0\xea(\xeb\x986\x14\a\x95:\xeb\xf9A\xfb\x13k\xed{\xed*\xa5p37m\xa8\xa7\x95&\xb0\x93p\xa3\xa7\xda\xf2H\x9f\xf5D\xae\b\x81=\xdb]\xcb\x10\xb7\x89\x8e\x8a\x9a\x80^k\xc9t\x1c\x00\x1a\x1d.\xe5\x18I\aRW\x99\x1f\xb1#\x1efv\xb7\xe8\x01\x03\t\b\x95\xa9Q\x8a\xe2\xbeq\x1e=\xebh\xd1S\x18\xff\xb7\xae\x9c\x9d#\xf7o\xcf\xf3\xeb@\x97\xdc\x9c\r0\xe4^f\xf59g\xa0\xe5\xe4\x1bN\xc6\xff7\xb3\x10\'\xc0\x04\xd5\xef\a70\x8e\xfb\x1e\x15\v\x12Ms7\x03\xa4\xbfv\xaf\xf8\x13F!\x17c\xde$\x1de(\xfb)\xc9\xaam\xad\xda\x03\x16.\xdb,\x86E~gO {J\x17*\x8bX\xb4/\xf9\xa6\xea\x9c\x12\x01\x91\x16\xff}\xa4\x95s\x87vH\xd8f\x01\x1f\xde\x8d0\"\xa3jM\xbb\xd65\xc2\n\x90\xdbP\xe8\xb1\xec\xd4\b\xba\x83\xd1)\x95\x06\xb9\xc1\xd3', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) shutdown(0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[], 0xfffffe47) lseek(r0, 0x0, 0x4) [ 367.211401][T10980] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.219086][T10980] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.227339][T10980] device bridge0 entered promiscuous mode 08:20:31 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r1) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000980)=""/102400, 0x19000}], 0x1, 0x0) [ 367.622526][T10981] __nla_validate_parse: 3 callbacks suppressed [ 367.622558][T10981] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 367.638970][T10981] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.646372][T10981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.654366][T10981] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.662034][T10981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.670513][T10981] device bridge0 left promiscuous mode [ 367.687320][T10988] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:32 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x35, 0x0, &(0x7f0000013000)) 08:20:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:32 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r1) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:32 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xfe89) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:20:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 368.280269][T11006] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.288013][T11006] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.296065][T11006] device bridge0 entered promiscuous mode 08:20:32 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x248, 0xd8, 0x5002004a, 0x0, 0xd8, 0x0, 0x1b0, 0x3c8, 0x3c8, 0x1b0, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @empty, 0x0, 0x0, 'vlan0\x00', 'gretap0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a8) dup3(r1, 0xffffffffffffffff, 0x80000) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) 08:20:32 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x4d, 0x0, &(0x7f0000013000)) 08:20:33 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x3d, 0x0, &(0x7f0000013000)) [ 368.852938][T11001] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 368.864710][T11008] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 368.877698][T11008] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.885256][T11008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.897804][T11008] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.906795][T11008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.924682][T11008] device bridge0 left promiscuous mode [ 369.002459][T11021] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.010130][T11021] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.017916][T11021] device bridge0 entered promiscuous mode 08:20:33 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x3b, 0x0, &(0x7f0000013000)) 08:20:33 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000013000)) 08:20:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r1) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:33 executing program 3: socket$inet(0x2, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="ddd3d26000c3dd124dc2c34d38e7b8e2a6e2ad344faee920b0399c8c010783ce286e01c151be6dd35e0c23d95359c48f63008f35ec58c194e61d7a18418276c41496db54834a602f9aba40b79c53e2906db200000000020000000000000032b5668fcf5b4c3b8e", 0x67) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x10062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e37, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:20:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 369.622709][T11025] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 369.632588][T11025] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.639825][T11025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.647806][T11025] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.655215][T11025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.663395][T11025] device bridge0 left promiscuous mode 08:20:34 executing program 4: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0xc01, 0x3, 0x1f0, 0xb8, 0x5002004a, 0x0, 0xb8, 0x0, 0x158, 0x3c8, 0x3c8, 0x158, 0x3c8, 0x3, 0x0, {[{{@ip={@multicast2, @local, 0x0, 0x0, 'team_slave_0\x00', 'gretap0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz1\x00'}}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'bond_slave_1\x00'}, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{}, {}, 0xf5de}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x250) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) wait4(0x0, 0x0, 0x0, 0x0) [ 369.676659][T11036] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) 08:20:34 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r1) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 370.010887][T11049] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.018524][T11049] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.026321][T11049] device bridge0 entered promiscuous mode 08:20:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:34 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10f008, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() tkill(r2, 0xd) write$cgroup_pid(r1, &(0x7f0000000080)=0xffffffffffffffff, 0x12) 08:20:34 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SUBMITURB(r0, 0x5514, 0x0) [ 370.681240][T11052] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 370.691283][T11052] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.698695][T11052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.706652][T11052] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.713983][T11052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.722173][T11052] device bridge0 left promiscuous mode 08:20:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1c, &(0x7f0000000000), 0x20a1563a) [ 370.734563][T11057] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r1) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:35 executing program 5: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x54, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x6, [], [@generic={0x0, 0x2f, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203d734"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 371.148985][T11069] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.156592][T11069] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.164278][T11069] device bridge0 entered promiscuous mode [ 371.595259][T11072] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 371.605326][T11072] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.612718][T11072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.620621][T11072] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.627953][T11072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.636155][T11072] device bridge0 left promiscuous mode [ 371.647285][T11078] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 371.981158][T11087] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.988852][T11087] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.996743][T11087] device bridge0 entered promiscuous mode [ 372.200299][T11089] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.209399][T11089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.221200][T11089] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.230226][T11089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.245110][T11089] device bridge0 left promiscuous mode 08:20:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrandom(&(0x7f0000000080)=""/192, 0xc0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002700), 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x54, 0x0) setresgid(0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x40000000011, r0, 0x6980b000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) 08:20:36 executing program 5: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x54, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x6, [], [@generic={0x0, 0x2f, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203d734"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:36 executing program 4: socket$inet(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:20:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:37 executing program 5: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x54, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x6, [], [@generic={0x0, 0x2f, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203d734"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r3, 0x100000001, 0x0, 0x2811ffff) [ 372.918631][T11109] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.926326][T11109] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.934054][T11109] device bridge0 entered promiscuous mode 08:20:37 executing program 5: syz_emit_ethernet(0x8a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x54, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x6, [], [@generic={0x0, 0x2f, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203d734"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r3, 0x100000001, 0x0, 0x2811ffff) [ 373.623952][T11112] __nla_validate_parse: 3 callbacks suppressed [ 373.623988][T11112] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 373.646085][T11112] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.654965][T11112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.666785][T11112] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.674260][T11112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.682383][T11112] device bridge0 left promiscuous mode [ 373.691668][T11114] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 373.706873][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:20:38 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 08:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 374.057615][T11132] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 374.361928][T11139] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000240)={0x4, 0x100000001, 0x3, 0x5}) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000100)='#+&)\x00', 0x0, r3) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x48c40, 0x0) 08:20:38 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x31, 0x0, &(0x7f0000013000)) 08:20:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:38 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 08:20:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 374.582574][T11145] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.590260][T11145] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.598261][T11145] device bridge0 entered promiscuous mode 08:20:39 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x36, 0x0, &(0x7f0000013000)) 08:20:39 executing program 5: syz_emit_ethernet(0x0, 0x0, 0x0) 08:20:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:39 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000240)={0x4, 0x100000001, 0x3, 0x5}) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000100)='#+&)\x00', 0x0, r3) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x48c40, 0x0) [ 375.133561][T11146] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.147604][T11146] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.156579][T11146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.168877][T11146] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.178473][T11146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.193614][T11146] device bridge0 left promiscuous mode [ 375.263860][T11156] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:39 executing program 3: socket$inet(0x2, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e37, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:20:39 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrandom(0x0, 0x0, 0x1) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x40000000011, r0, 0x6980b000) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 375.921322][T11183] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:40 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 376.218397][T11186] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.226066][T11186] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.233754][T11186] device bridge0 entered promiscuous mode 08:20:41 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:41 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x10, 0x0, &(0x7f0000000040)=[@acquire={0x40046304}, @decrefs={0x40046304}], 0x0, 0x0, 0x0}) [ 376.724957][T11190] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 376.740400][T11190] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.748786][T11190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.761240][T11190] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.768833][T11190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.787134][T11190] device bridge0 left promiscuous mode [ 376.835743][T11201] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 376.847181][T11204] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 377.122207][ T33] audit: type=1400 audit(1595060441.608:11): avc: denied { set_context_mgr } for pid=11208 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=binder permissive=1 08:20:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 377.198135][T11210] binder: BINDER_SET_CONTEXT_MGR already set [ 377.204439][T11210] binder: 11208:11210 ioctl 40046207 0 returned -16 08:20:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) 08:20:42 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x1c, 0x6, 0x0, @remote, @local, {[@dstopts], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 08:20:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 377.653476][T11218] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.661043][T11218] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.669032][T11218] device bridge0 entered promiscuous mode 08:20:42 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x1c, 0x6, 0x0, @remote, @local, {[@dstopts], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 378.030810][T11220] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.038495][T11220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.046557][T11220] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.053982][T11220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.062720][T11220] device bridge0 left promiscuous mode [ 378.072357][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:20:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 08:20:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:42 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0x1fffffffffffffff) 08:20:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:43 executing program 5: syz_emit_ethernet(0x52, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x1c, 0x6, 0x0, @remote, @local, {[@dstopts], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 378.777182][T11255] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.788631][T11255] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.796314][T11255] device bridge0 entered promiscuous mode [ 378.983047][ T33] audit: type=1800 audit(1595060443.468:12): pid=11260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15983 res=0 08:20:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r2, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 379.091433][ T33] audit: type=1800 audit(1595060443.498:13): pid=11260 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15983 res=0 08:20:43 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x14, 0x6, 0x0, @remote, @ipv4={[], [], @broadcast}, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:43 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x24, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x0, [], [@generic]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 379.402646][T11250] __nla_validate_parse: 4 callbacks suppressed [ 379.402678][T11250] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 379.419871][T11257] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 379.441139][T11257] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.449284][T11257] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.465961][T11257] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.476377][T11257] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.485030][T11257] device bridge0 left promiscuous mode 08:20:44 executing program 4: ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = creat(&(0x7f0000000340)='./file0/file0\x00', 0x8) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/98, 0x62}}], 0x1, 0x120, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x363) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x83, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x9000, 0x0, 0x40, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 379.499618][T11268] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:20:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:44 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e37, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:20:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:44 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x24, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x0, [], [@generic]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 379.978014][T11281] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:44 executing program 4: ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = creat(&(0x7f0000000340)='./file0/file0\x00', 0x8) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/98, 0x62}}], 0x1, 0x120, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x363) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x83, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x9000, 0x0, 0x40, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 08:20:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 380.290966][T11293] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.298644][T11293] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.306418][T11293] device bridge0 entered promiscuous mode 08:20:45 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x24, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x0, [], [@generic]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:45 executing program 4: ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = creat(&(0x7f0000000340)='./file0/file0\x00', 0x8) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/98, 0x62}}], 0x1, 0x120, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x363) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x83, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x9000, 0x0, 0x40, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 380.948671][T11290] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 380.963334][T11290] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.973805][T11290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.989108][T11290] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.997706][T11290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.014861][T11290] device bridge0 left promiscuous mode [ 381.041943][T11302] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 381.059164][T11305] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.066857][T11305] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.075284][T11305] device bridge0 entered promiscuous mode 08:20:45 executing program 5: syz_emit_ethernet(0x72, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x3c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x3, [], [@generic={0x0, 0x18, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c82"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:46 executing program 4: ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = creat(&(0x7f0000000340)='./file0/file0\x00', 0x8) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/98, 0x62}}], 0x1, 0x120, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x363) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x83, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x9000, 0x0, 0x40, 0x0, 0x99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 08:20:46 executing program 1: r0 = dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 381.643459][T11307] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 381.653488][T11307] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.660822][T11307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.668837][T11307] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.676226][T11307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.684538][T11307] device bridge0 left promiscuous mode [ 381.797348][T11324] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 382.063717][T11330] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.071323][T11330] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.079787][T11330] device bridge0 entered promiscuous mode [ 382.444288][T11333] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 382.460331][T11333] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.469524][T11333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.482424][T11333] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.491677][T11333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.525778][T11333] device bridge0 left promiscuous mode 08:20:47 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x10, 0x0, &(0x7f0000000040)=[@acquire={0x40046304}, @decrefs={0x40046306}], 0x0, 0x0, 0x0}) 08:20:47 executing program 5: syz_emit_ethernet(0x72, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x3c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x3, [], [@generic={0x0, 0x18, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c82"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000980)=""/102400, 0x19000}], 0x1, 0x8) 08:20:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 382.810177][T11347] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 382.849091][T11349] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.856760][T11349] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.864659][T11349] device bridge0 entered promiscuous mode 08:20:47 executing program 1: r0 = dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:47 executing program 5: syz_emit_ethernet(0x72, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x3c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x3, [], [@generic={0x0, 0x18, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c82"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in=@broadcast}, {@in6=@empty, 0x0, 0x32}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1}}]}, 0x154}}, 0x0) 08:20:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 383.471428][T11352] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.480181][T11352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.494137][T11352] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.503138][T11352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.523209][T11352] device bridge0 left promiscuous mode 08:20:48 executing program 3: clone(0x40000d9128d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:20:48 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x44, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x4, [], [@generic={0x0, 0x24, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d61"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 383.819337][T11362] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.826930][T11362] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.834622][T11362] device bridge0 entered promiscuous mode 08:20:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 384.063613][T11375] IPVS: ftp: loaded support on port[0] = 21 [ 384.078559][ T33] audit: type=1400 audit(1595060448.538:14): avc: denied { sys_admin } for pid=11374 comm="syz-executor.3" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 384.184352][T11366] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.191809][T11366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.199832][T11366] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.207233][T11366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.215476][T11366] device bridge0 left promiscuous mode 08:20:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:49 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e37, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:20:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x44, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x4, [], [@generic={0x0, 0x24, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d61"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 384.598672][T11402] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.606308][T11402] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.614676][T11402] device bridge0 entered promiscuous mode 08:20:49 executing program 1: r0 = dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x44, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x4, [], [@generic={0x0, 0x24, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d61"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 385.206141][T11405] __nla_validate_parse: 3 callbacks suppressed [ 385.206178][T11405] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 385.227864][T11405] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.236909][T11405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.254403][T11405] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.264273][T11405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.297899][T11405] device bridge0 left promiscuous mode [ 385.309525][T11406] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 385.325763][T11415] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.333561][T11415] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.341389][T11415] device bridge0 entered promiscuous mode 08:20:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:50 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x5, [], [@generic={0x0, 0x2a, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 386.145340][T11429] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 386.492410][ T9026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 386.524807][T11434] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.532547][T11434] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.540289][T11434] device bridge0 entered promiscuous mode [ 387.134259][T11435] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 387.148019][T11435] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.157211][T11435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.170039][T11435] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.179380][T11435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.197173][T11435] device bridge0 left promiscuous mode [ 387.278409][T11443] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 387.295583][T11446] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 387.310379][T11446] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.319482][T11446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.332798][T11446] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.341204][T11446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.363465][T11446] device bridge0 left promiscuous mode [ 387.551653][ T9021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:20:52 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:20:52 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x5, [], [@generic={0x0, 0x2a, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 388.282177][T11460] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.289856][T11460] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.297577][T11460] device bridge0 entered promiscuous mode 08:20:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:53 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:20:53 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x5, [], [@generic={0x0, 0x2a, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 388.968683][T11458] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 388.994415][T11463] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.002227][T11463] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.009945][T11463] device bridge0 entered promiscuous mode 08:20:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:53 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x5, [], [@generic={0x0, 0x2d, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:53 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 389.444250][T11465] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 389.454025][T11465] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.461269][T11465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.469506][T11465] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.476866][T11465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.485027][T11465] device bridge0 left promiscuous mode 08:20:54 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x5, [], [@generic={0x0, 0x2d, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 389.495911][T11467] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 389.506019][T11467] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.513257][T11467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.521245][T11467] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.528675][T11467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.537248][T11467] device bridge0 left promiscuous mode 08:20:54 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 389.658791][T11484] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:54 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x5, [], [@generic={0x0, 0x2d, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:54 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 390.319511][T11495] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 390.447000][T11500] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.454619][T11500] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.462164][T11500] device bridge0 entered promiscuous mode 08:20:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:55 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x6, [], [@generic={0x0, 0x2e, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203d7"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:55 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 390.964294][T11505] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 390.976386][T11505] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.985752][T11505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.997014][T11505] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.006132][T11505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.018859][T11505] device bridge0 left promiscuous mode [ 391.064190][T11508] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.071827][T11508] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.079599][T11508] device bridge0 entered promiscuous mode 08:20:55 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x6, [], [@generic={0x0, 0x2e, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203d7"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:56 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 391.771574][T11509] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 391.781764][T11509] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.789157][T11509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.797041][T11509] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.804355][T11509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.812450][T11509] device bridge0 left promiscuous mode [ 391.823187][T11514] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 391.974042][ T3079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:20:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:56 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x4c, 0x6, 0x0, @remote, @local, {[@dstopts={0x0, 0x6, [], [@generic={0x0, 0x2e, "740df1473e0b839d82b93f52a6880361270a9eb1ef4e9c827bc6ec8d30564a688a623d613aaeed0bc48e3c5203d7"}]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 08:20:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:56 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 392.526204][T11536] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 392.572551][T11539] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.580281][T11539] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.588714][T11539] device bridge0 entered promiscuous mode 08:20:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:57 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file1\x00') r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x100000001, 0x0, 0x2811ffff) creat(&(0x7f0000000240)='./file0\x00', 0x0) 08:20:57 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:20:57 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 393.323395][T11542] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 393.333649][T11542] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.340904][T11542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.348841][T11542] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.356233][T11542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.365217][T11542] device bridge0 left promiscuous mode 08:20:57 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:20:58 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 393.816301][T11546] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.824123][T11546] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.831729][T11546] device bridge0 entered promiscuous mode [ 394.098560][T11548] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 394.108608][T11548] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.116026][T11548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.123910][T11548] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.131266][T11548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.139650][T11548] device bridge0 left promiscuous mode [ 394.152696][T11553] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:20:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:20:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x200005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 08:20:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:58 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:20:58 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 394.507155][T11575] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.514975][T11575] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.522995][T11575] device bridge0 entered promiscuous mode [ 394.674296][T11576] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 394.711620][T11576] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.720437][T11576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.733847][T11576] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.744057][T11576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.759691][T11576] device bridge0 left promiscuous mode [ 395.177879][T11587] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.185626][T11587] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.194141][T11587] device bridge0 entered promiscuous mode 08:20:59 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:20:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:20:59 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:20:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000280)) [ 395.714075][T11586] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 395.726460][T11588] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 395.739356][T11588] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.748072][T11588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.761063][T11588] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.768763][T11588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.783467][T11588] device bridge0 left promiscuous mode 08:21:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x8, 0x4) listen(r0, 0x5) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "028200", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 08:21:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:00 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:00 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 396.237135][T11603] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.244733][T11603] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.252523][T11603] device bridge0 entered promiscuous mode 08:21:00 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0xd223) 08:21:01 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 396.644199][ T33] audit: type=1800 audit(1595060461.128:15): pid=11626 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16103 res=0 [ 396.664856][ T33] audit: type=1800 audit(1595060461.148:16): pid=11626 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16103 res=0 08:21:01 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 396.827254][T11605] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 396.837223][T11605] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.844600][T11605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.852514][T11605] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.859894][T11605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.869246][T11605] device bridge0 left promiscuous mode [ 396.889979][T11612] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 396.913102][T11618] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.920783][T11618] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.929830][T11618] device bridge0 entered promiscuous mode 08:21:01 executing program 2: r0 = dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:01 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 397.403782][T11621] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 397.413543][T11621] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.420964][T11621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.428944][T11621] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.436338][T11621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.444584][T11621] device bridge0 left promiscuous mode [ 397.688817][T11641] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 397.821353][T11645] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.829132][T11645] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.837311][T11645] device bridge0 entered promiscuous mode 08:21:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:02 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:02 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 398.460842][T11647] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 398.474037][T11647] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.483751][T11647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.499793][T11647] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.509590][T11647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.550982][T11647] device bridge0 left promiscuous mode [ 398.592949][T11657] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 398.635189][T11659] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.642676][T11659] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.650583][T11659] device bridge0 entered promiscuous mode 08:21:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 398.967011][T11662] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 398.981406][T11662] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.990474][T11662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.003724][T11662] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.013724][T11662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.030687][T11662] device bridge0 left promiscuous mode 08:21:03 executing program 2: r0 = dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:03 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 399.323276][T11679] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 399.512225][ T9026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 399.540057][T11689] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.547793][T11689] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.555482][T11689] device bridge0 entered promiscuous mode 08:21:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:04 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 400.109491][T11692] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.119024][T11692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.131789][T11692] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.139819][T11692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.154182][T11692] device bridge0 left promiscuous mode 08:21:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 400.519621][T11698] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.527340][T11698] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.535226][T11698] device bridge0 entered promiscuous mode 08:21:05 executing program 2: r0 = dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r0, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:05 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 400.913001][T11699] __nla_validate_parse: 1 callbacks suppressed [ 400.913037][T11699] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 400.929841][T11699] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.937162][T11699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.945080][T11699] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.952326][T11699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.960537][T11699] device bridge0 left promiscuous mode [ 400.977353][T11703] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 401.218306][T11725] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.226011][T11725] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.233541][T11725] device bridge0 entered promiscuous mode 08:21:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:06 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 401.804181][T11728] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 401.818681][T11728] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.827076][T11728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.839181][T11728] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.847669][T11728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.863066][T11728] device bridge0 left promiscuous mode [ 401.935374][T11738] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 401.963033][T11744] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.970865][T11744] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.979292][T11744] device bridge0 entered promiscuous mode 08:21:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 402.502104][T11750] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 402.515610][T11750] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.525256][T11750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.542147][T11750] bridge0: port 1(bridge_slave_0) entered blocking state 08:21:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:07 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, &(0x7f0000013000)) [ 402.551149][T11750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.572134][T11750] device bridge0 left promiscuous mode 08:21:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 402.781989][T11760] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 403.113447][T11773] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.121226][T11773] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.129240][T11773] device bridge0 entered promiscuous mode 08:21:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:07 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 403.768454][T11776] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 403.783006][T11776] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.791970][T11776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.806175][T11776] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.814819][T11776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.831778][T11776] device bridge0 left promiscuous mode [ 403.882804][T11781] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:08 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 404.340208][T11790] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.347826][T11790] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.355571][T11790] device bridge0 entered promiscuous mode 08:21:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:09 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, &(0x7f0000013000)) 08:21:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 404.784188][T11792] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 404.794166][T11792] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.801406][T11792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.809401][T11792] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.816848][T11792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.825890][T11792] device bridge0 left promiscuous mode [ 404.837456][T11799] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 404.851384][T11808] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.858998][T11808] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.867242][T11808] device bridge0 entered promiscuous mode 08:21:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:09 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, &(0x7f0000013000)) 08:21:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 405.415650][T11811] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.422939][T11811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.430945][T11811] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.438277][T11811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.446667][T11811] device bridge0 left promiscuous mode 08:21:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 405.796122][T11832] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.803902][T11832] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.811438][T11832] device bridge0 entered promiscuous mode 08:21:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:10 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, &(0x7f0000013000)) 08:21:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:10 executing program 5: exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:10 executing program 5: exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:10 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, &(0x7f0000013000)) 08:21:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 406.337030][T11834] __nla_validate_parse: 2 callbacks suppressed [ 406.337131][T11834] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 406.358553][T11834] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.367178][T11834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.379156][T11834] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.387799][T11834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.402574][T11834] device bridge0 left promiscuous mode [ 406.462784][T11840] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 406.499205][T11849] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.506860][T11849] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.514629][T11849] device bridge0 entered promiscuous mode 08:21:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 406.868285][T11851] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 406.878292][T11851] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.885757][T11851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.893635][T11851] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.901027][T11851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.909332][T11851] device bridge0 left promiscuous mode 08:21:11 executing program 5: exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 407.077070][T11860] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:11 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, 0x0) 08:21:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:11 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:12 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, 0x0) [ 407.571212][T11870] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.578869][T11870] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.587453][T11870] device bridge0 entered promiscuous mode 08:21:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:12 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:12 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_int(r0, 0x29, 0x39, 0x0, 0x0) [ 408.144706][T11874] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 408.164026][T11874] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.174326][T11874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.192945][T11874] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.201357][T11874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.237633][T11874] device bridge0 left promiscuous mode [ 408.276245][T11872] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrandom(0x0, 0x0, 0x1) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x8, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="020000000100", @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYBLOB='\b\x00', @ANYBLOB, @ANYRES32, @ANYBLOB="10000200000000002000"], 0x54, 0x0) setresgid(0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x40000000011, r1, 0x6980b000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 408.550577][T11880] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.558268][T11880] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.566900][T11880] device bridge0 entered promiscuous mode 08:21:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 408.934092][T11884] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 408.944007][T11884] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.951618][T11884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.959552][T11884] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.966972][T11884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.976385][T11884] device bridge0 left promiscuous mode [ 408.990287][T11899] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 409.021143][T11910] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.028825][T11910] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.036692][T11910] device bridge0 entered promiscuous mode 08:21:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:13 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:13 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000640)={'HL\x00'}, &(0x7f0000000680)=0x1e) sched_setattr(0x0, 0x0, 0x0) 08:21:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 409.527422][T11920] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 409.538098][T11907] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 409.553221][T11907] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.561628][T11907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.572787][T11907] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.580877][T11907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.598469][T11907] device bridge0 left promiscuous mode 08:21:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 409.925625][T11930] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.933266][T11930] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.941362][T11930] device bridge0 entered promiscuous mode 08:21:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:14 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) sendmmsg(r0, &(0x7f0000006c40)=[{{&(0x7f00000055c0)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00', 0x8}, 0x80, 0x0}}], 0x1, 0x0) 08:21:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 410.501787][T11933] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.511085][T11933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.523881][T11933] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.532083][T11933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.550283][T11933] device bridge0 left promiscuous mode 08:21:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 410.782285][T11949] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.789966][T11949] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.798029][T11949] device bridge0 entered promiscuous mode 08:21:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:15 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e37, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:21:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 411.166701][T11950] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.175804][T11950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.187386][T11950] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.196937][T11950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.210623][T11950] device bridge0 left promiscuous mode 08:21:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 411.516560][ T9026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 411.582157][T11965] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.589814][T11965] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.597747][T11965] device bridge0 entered promiscuous mode 08:21:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 412.244117][T11971] __nla_validate_parse: 4 callbacks suppressed [ 412.244149][T11971] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 412.264449][T11969] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 412.280128][T11969] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.288224][T11969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.300155][T11969] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.308946][T11969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.323355][T11969] device bridge0 left promiscuous mode [ 412.414600][T11978] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.422243][T11978] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.429812][T11978] device bridge0 entered promiscuous mode 08:21:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 412.660811][T11980] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 412.677130][T11980] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.685505][T11980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.699267][T11980] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.707832][T11980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.721657][T11980] device bridge0 left promiscuous mode 08:21:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 413.169111][T11992] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 413.642316][T11999] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.649988][T11999] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.657844][T11999] device bridge0 entered promiscuous mode [ 413.874462][T12000] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 413.888797][T12000] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.896365][T12000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.910165][T12000] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.919664][T12000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.937179][T12000] device bridge0 left promiscuous mode 08:21:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) sendmmsg(r0, &(0x7f0000001380)=[{{&(0x7f00000055c0)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}, 0x80}, 0x80, 0x0}}], 0x1, 0x0) 08:21:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 414.347735][T12012] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 414.364698][T12011] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 414.456702][T12016] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.464566][T12016] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.472512][T12016] device bridge0 entered promiscuous mode 08:21:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:19 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0x1fffffff00080000) [ 414.984039][T12021] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 414.993984][T12021] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.001536][T12021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 415.009542][T12021] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.016922][T12021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 415.025328][T12021] device bridge0 left promiscuous mode [ 415.044304][T12026] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 415.200581][ T33] audit: type=1800 audit(1595060479.688:17): pid=12033 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16208 res=0 [ 415.221484][ T33] audit: type=1800 audit(1595060479.698:18): pid=12033 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16208 res=0 08:21:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r2) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'ip_vti0\x00', 0x201e}) 08:21:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 415.640512][T12036] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r2) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:20 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='fd/3\x00') r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x165042, 0x0) read$FUSE(r1, &(0x7f0000000600), 0xfffffe6f) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) [ 416.013112][T12050] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.020746][T12050] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.029837][T12050] device bridge0 entered promiscuous mode 08:21:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 416.337434][T12051] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.347037][T12051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.359169][T12051] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.366819][T12051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.382652][T12051] device bridge0 left promiscuous mode 08:21:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 08:21:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r2) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:21 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000ffffff7f0000000002000000000000ff01"]) 08:21:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:21:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 417.228141][T12077] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.236244][T12077] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.244354][T12077] device bridge0 entered promiscuous mode 08:21:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 417.804345][T12078] __nla_validate_parse: 5 callbacks suppressed [ 417.804540][T12078] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 417.822640][T12078] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.831022][T12078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.843932][T12078] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.854966][T12078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.879510][T12078] device bridge0 left promiscuous mode [ 417.956500][T12090] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:22 executing program 3: pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x7fffffff, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f41f4cbace7f9a7df0200000000e80001dd0000040d000d", 0x1f}], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='\'\x00\x00\x00!', 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='s', 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 08:21:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 418.506653][T12101] netlink: 'syz-executor.3': attribute type 13 has an invalid length. [ 418.515066][T12101] netlink: 71 bytes leftover after parsing attributes in process `syz-executor.3'. [ 418.535064][T12102] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 418.700240][T12109] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={0xffffffffffffffff, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 419.074786][T12116] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.082587][T12116] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.090219][T12116] device bridge0 entered promiscuous mode 08:21:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:23 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) write$P9_RWRITE(r1, 0x0, 0x0) 08:21:24 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)={0x0, 0x7fffffff, 0x2}) 08:21:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 419.664423][T12118] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 419.676264][T12119] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 419.691294][T12119] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.699933][T12119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.711398][T12119] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.721238][T12119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.736826][T12119] device bridge0 left promiscuous mode 08:21:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 419.893066][T12131] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150, 0x0, &(0x7f0000000140)="207ef39cbe2bfe2d20000000000001005c3f0ec27c70f69509e1c625ddda54090944e27ca559c64e9a385db4e4934ac5eb09ff2daaeeea8ed7f739866f053fc954404133ca610bd44acb182d5c781082bb500500d9ffb0e836b1a7ae0e0f3b53e5868adcd4e7102559cb00621f9906beb748da887735087e904c38b588349a7f324300000000cab810682b9e1debc1ca43696b39594d7870a10f3f5ce9afd1ce80e6f77b5f3d695f8ee93a25e6dbb30872010126515add92f1d19d9e207f9d3a5e1d22ae7843f7c0ef67865c9f7cf33079b0b193e769547acf69f9be9c3a97ea53d99f48bc693d00000000000000b5c1bea2be64c6a7baefcb0d686c3eaf9ce3f1f8e46f31a4d103e3cba7f46b6a0043651cdddaef523747b24fb43c9f44111477e24bd467c4d06bfa1221bd0a55e7a4fa8bbfd6c4a0a131eab89db98471fa719f63ce5eda2037b929b3c30caefe8b10"}, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x14, 0x1}, 0x14}}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:21:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0x0, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 08:21:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 420.318324][T12144] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:24 executing program 3: syz_emit_ethernet(0x11, &(0x7f0000000080)={@broadcast, @remote, @void, {@x25}}, 0x0) 08:21:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0x0, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 420.676105][ T4883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 421.060697][T12153] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0x0, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 421.277206][T12164] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.285034][T12164] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.292850][T12164] device bridge0 entered promiscuous mode 08:21:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 08:21:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1100000042000506"], 0x14}}, 0x0) 08:21:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, 0x0) [ 421.750525][T12165] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.759270][T12165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.772075][T12165] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.781433][T12165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.793891][T12165] device bridge0 left promiscuous mode 08:21:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 422.088914][T12172] not chained 10000 origins [ 422.093460][T12172] CPU: 0 PID: 12172 Comm: syz-executor.3 Not tainted 5.8.0-rc5-syzkaller #0 [ 422.102114][T12172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.112155][T12172] Call Trace: [ 422.115440][T12172] dump_stack+0x1df/0x240 [ 422.119781][T12172] kmsan_internal_chain_origin+0x6f/0x130 [ 422.125494][T12172] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 422.131285][T12172] ? kmsan_get_metadata+0x4f/0x180 [ 422.136388][T12172] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 422.142396][T12172] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 422.148451][T12172] ? __wake_up+0x1ff/0x250 [ 422.152857][T12172] ? kmsan_get_metadata+0x4f/0x180 [ 422.157957][T12172] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 422.163758][T12172] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 422.169816][T12172] ? netlink_recvmsg+0x17f0/0x1910 [ 422.174929][T12172] ? kmsan_get_metadata+0x4f/0x180 [ 422.180026][T12172] ? kmsan_set_origin_checked+0x95/0xf0 [ 422.185561][T12172] ? kmsan_internal_unpoison_shadow+0x2f/0x40 [ 422.191643][T12172] ? _copy_from_user+0x15b/0x260 [ 422.196569][T12172] ? kmsan_get_metadata+0x4f/0x180 [ 422.201701][T12172] __msan_chain_origin+0x50/0x90 [ 422.206635][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.211755][T12172] get_compat_msghdr+0x108/0x270 [ 422.216700][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.221209][T12172] ? kmsan_internal_set_origin+0x75/0xb0 [ 422.226869][T12172] ? _copy_from_user+0x15b/0x260 [ 422.231795][T12172] ? kmsan_get_metadata+0x4f/0x180 [ 422.236914][T12172] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 422.242709][T12172] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 422.248853][T12172] ? get_old_timespec32+0x18d/0x2f0 [ 422.254064][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.258739][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.264802][T12172] ? __x32_compat_sys_recvmmsg_time64+0x80/0x80 [ 422.271031][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.277519][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.283322][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.288784][T12172] do_SYSENTER_32+0x73/0x90 [ 422.293277][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.299603][T12172] RIP: 0023:0xf7fe3549 [ 422.303654][T12172] Code: Bad RIP value. [ 422.307710][T12172] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000151 [ 422.316105][T12172] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020002d80 [ 422.324061][T12172] RDX: 00000000000006b9 RSI: 000000000001a002 RDI: 0000000020000180 [ 422.332017][T12172] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 422.339969][T12172] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 422.347943][T12172] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 422.355923][T12172] Uninit was stored to memory at: [ 422.360952][T12172] kmsan_internal_chain_origin+0xad/0x130 [ 422.366742][T12172] __msan_chain_origin+0x50/0x90 [ 422.372101][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.377217][T12172] get_compat_msghdr+0x108/0x270 [ 422.382399][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.386896][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.391557][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.397604][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.403749][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.408932][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.413780][T12172] do_SYSENTER_32+0x73/0x90 [ 422.418265][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.424566][T12172] [ 422.426874][T12172] Uninit was stored to memory at: [ 422.431883][T12172] kmsan_internal_chain_origin+0xad/0x130 [ 422.437604][T12172] __msan_chain_origin+0x50/0x90 [ 422.442554][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.447690][T12172] get_compat_msghdr+0x108/0x270 [ 422.452617][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.457109][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.461892][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.467956][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.474107][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.479304][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.484144][T12172] do_SYSENTER_32+0x73/0x90 [ 422.488633][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.495109][T12172] [ 422.497422][T12172] Uninit was stored to memory at: [ 422.502430][T12172] kmsan_internal_chain_origin+0xad/0x130 [ 422.508150][T12172] __msan_chain_origin+0x50/0x90 [ 422.513176][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.518278][T12172] get_compat_msghdr+0x108/0x270 [ 422.523203][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.527698][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.532366][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.538421][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.544562][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.549751][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.554587][T12172] do_SYSENTER_32+0x73/0x90 [ 422.559094][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.565422][T12172] [ 422.567734][T12172] Uninit was stored to memory at: [ 422.572745][T12172] kmsan_internal_chain_origin+0xad/0x130 [ 422.578449][T12172] __msan_chain_origin+0x50/0x90 [ 422.583412][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.588509][T12172] get_compat_msghdr+0x108/0x270 [ 422.593431][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.597922][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.602675][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.608727][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.614865][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.620069][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.624914][T12172] do_SYSENTER_32+0x73/0x90 [ 422.629411][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.635717][T12172] [ 422.638027][T12172] Uninit was stored to memory at: [ 422.643038][T12172] kmsan_internal_chain_origin+0xad/0x130 [ 422.648743][T12172] __msan_chain_origin+0x50/0x90 [ 422.653671][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.658774][T12172] get_compat_msghdr+0x108/0x270 [ 422.663877][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.668365][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.673041][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.679109][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.685252][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.690439][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.695395][T12172] do_SYSENTER_32+0x73/0x90 [ 422.700495][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.706798][T12172] [ 422.709109][T12172] Uninit was stored to memory at: [ 422.714121][T12172] kmsan_internal_chain_origin+0xad/0x130 [ 422.719824][T12172] __msan_chain_origin+0x50/0x90 [ 422.724748][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.729847][T12172] get_compat_msghdr+0x108/0x270 [ 422.734786][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.739273][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.743937][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.750174][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.756314][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.761494][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.766331][T12172] do_SYSENTER_32+0x73/0x90 [ 422.770831][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.777133][T12172] [ 422.779453][T12172] Uninit was stored to memory at: [ 422.784462][T12172] kmsan_internal_chain_origin+0xad/0x130 [ 422.790164][T12172] __msan_chain_origin+0x50/0x90 [ 422.795087][T12172] __get_compat_msghdr+0x5be/0x890 [ 422.800184][T12172] get_compat_msghdr+0x108/0x270 [ 422.805106][T12172] do_recvmmsg+0xa6a/0x1ee0 [ 422.809594][T12172] __sys_recvmmsg+0x2ca/0x510 [ 422.814254][T12172] __se_compat_sys_recvmmsg_time32+0xfb/0x120 [ 422.820310][T12172] __ia32_compat_sys_recvmmsg_time32+0x62/0x80 [ 422.826446][T12172] __do_fast_syscall_32+0x2aa/0x400 [ 422.831627][T12172] do_fast_syscall_32+0x6b/0xd0 [ 422.836548][T12172] do_SYSENTER_32+0x73/0x90 [ 422.841039][T12172] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 422.847339][T12172] [ 422.849652][T12172] Local variable ----msg_sys@do_recvmmsg created at: [ 422.856310][T12172] do_recvmmsg+0xc5/0x1ee0 [ 422.860710][T12172] do_recvmmsg+0xc5/0x1ee0 08:21:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x0, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000003c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60a4f20800183afffe800000000000000000000000000000fe8000000000000000000000000000aa8800907800000000fe8000000000000000000000000000bbcc5ff6a2e3e178a6e58cae613373913dfab4f6debd07065a66c4fb4633a630d8fd20466da6805b487a80058230299dc07caecef3a668a3f32331852baaccc133bbd679e03da63ef626015b4c46288971e6cac63c20d49d35721f49fdf0e197cbd79108753538251705077d160f8af02e5462a78960d87fe8434e5f5a39901793551c7de6b6"], 0x0) 08:21:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, 0x0) 08:21:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 423.244538][T12186] __nla_validate_parse: 3 callbacks suppressed [ 423.244572][T12186] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x0, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 423.451203][T12195] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.458894][T12195] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.466636][T12195] device bridge0 entered promiscuous mode 08:21:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, 0x0) 08:21:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0xde8c074acb69695f, 0x0) [ 423.847446][T12196] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 423.862146][T12196] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.869749][T12196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 423.882729][T12196] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.890338][T12196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 423.908216][T12196] device bridge0 left promiscuous mode [ 423.980006][T12198] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 424.018134][T12206] x_tables: duplicate underflow at hook 2 08:21:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x9, 0x3, 0x1dc, 0x90, 0x0, 0x0, 0x90, 0x0, 0x148, 0x170, 0x170, 0x148, 0x170, 0x3, 0x0, {[{{@ip={@remote, @broadcast, 0x0, 0x0, 'gre0\x00', 'vlan1\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x238) r1 = socket(0x2, 0x3, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x79) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r1, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000740)=ANY=[], 0x58) 08:21:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x0, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 424.342809][T12214] x_tables: duplicate underflow at hook 3 [ 424.360996][T12212] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 424.403447][T12214] x_tables: duplicate underflow at hook 3 [ 424.637464][T12220] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1100000042000506"], 0x14}}, 0x0) 08:21:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x1c, r0, 0xe01, 0x70b52b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000427bd7000ffdbdf251200000008002c006f0a0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x48040) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r0, 0x302, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}}, 0x8003) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000180)={0x0, 0x7fffffff}) 08:21:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)={0x0, 0x7fffffff}) 08:21:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 425.368570][T12230] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 425.479037][T12239] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.486674][T12239] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.494539][T12239] device bridge0 entered promiscuous mode 08:21:30 executing program 4: syz_emit_ethernet(0x86, &(0x7f0000000080)={@multicast, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @broadcast=0xac1414aa}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "b61dbffee8a5b7c717ea704ff671b9cf29d80f57fc5694d4355ca98eb068ab93", "f482381e8c9fca1e1300087242295772", {"ddcc14d2c6b33c50bf8e9bc8e8c4856a", "1f1e80989cb4923c55cd0d720708bdfb"}}}}}}}, 0x0) 08:21:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:30 executing program 5: link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x145042, 0x0) write(r2, &(0x7f0000001200)="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", 0xffffffffffffff3e) [ 425.862890][T12240] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 425.877876][T12242] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 425.891965][T12242] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.900540][T12242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.913282][T12242] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.921074][T12242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.936241][T12242] device bridge0 left promiscuous mode [ 426.120424][T12252] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:30 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWRITE(r1, 0x0, 0x0) 08:21:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x240007bd, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 08:21:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 426.766962][T12263] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 426.844426][ T33] audit: type=1800 audit(1595060491.328:19): pid=12254 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16272 res=0 [ 426.865001][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:21:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r2) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:31 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) ptrace$setopts(0x4206, r2, 0x400, 0x23) r3 = openat$hwrng(0xffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0x4) ioctl$sock_proto_private(r4, 0x89e0, &(0x7f0000000000)) syncfs(r4) [ 427.104594][T12271] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.112160][T12271] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.119836][T12271] device bridge0 entered promiscuous mode 08:21:31 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000070000ff"]) 08:21:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = dup(0xffffffffffffffff) open$dir(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000280)=ANY=[], 0x8) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x40) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={0x0, 0x1c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 08:21:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000080)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7fba, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:21:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 427.719413][T12275] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.728549][T12275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.741259][T12275] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.750822][T12275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.767109][T12275] device bridge0 left promiscuous mode 08:21:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r2) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) [ 427.914159][T12289] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 428.059365][ T33] audit: type=1800 audit(1595060492.548:20): pid=12289 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16247 res=0 [ 428.107025][T12293] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:21:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = dup(0xffffffffffffffff) open$dir(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000280)=ANY=[], 0x8) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x40) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={0x0, 0x1c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 08:21:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 428.285143][T12297] __nla_validate_parse: 3 callbacks suppressed [ 428.285227][T12297] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 428.303036][T12298] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000000)=ANY=[], 0x1) 08:21:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r3 = dup(r2) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:33 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000080)={0x0, 0x7fffffff, 0x2, 0x0, 0x1, [{}]}) [ 428.854365][T12311] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 428.915068][T12313] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = dup(0xffffffffffffffff) open$dir(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000280)=ANY=[], 0x8) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x40) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={0x0, 0x1c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 08:21:33 executing program 4: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) get_mempolicy(0x0, &(0x7f0000000280), 0x80000001, &(0x7f00005ad000/0x1000)=nil, 0x3) r0 = memfd_create(&(0x7f0000000040)='?\x94\xf9xw\xba\xe7\"\x8eHT:/dev/a\xb9\x00\xb2\xb1 \x06\xb0\xba\xe6x2s\x00>\xbc\x9d!\x05\x91\f,\xf3$\xb6\x1c;<\xbd\xb2c\xb1\xf53\xf3R\xbf\x8f\x7f\x14\xc9\xa7\x8f\xd5t\x9e\xeb=k\x93g9\x92\xe6\x06q\xbdT>', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r0, 0x0) 08:21:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:33 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x145042, 0x0) write(r1, &(0x7f0000001200)="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", 0xffffffffffffff3e) creat(&(0x7f00000000c0)='./file0\x00', 0x30) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x100001400000010, 0x2, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0x24}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) [ 429.560523][T12330] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 429.629523][T12332] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = dup(0xffffffffffffffff) open$dir(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000280)=ANY=[], 0x8) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x40) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={0x0, 0x1c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 08:21:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:34 executing program 4: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300), 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007f80)=[{{0x0, 0xe000008, &(0x7f0000000180)=[{&(0x7f0000000000)="94eb98c5f97e2c2a4a02408ccb88a96a52bbf810f9b72aa17225a6c6bcb1f56bc51ce9668fee7066d816af4c6bf88f7adff4c49f3dc6e467603e98d004b63403d6570cf7d036784cb892eb7750", 0x4d}, {&(0x7f00000003c0)="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", 0x574}], 0x2}}], 0x400000000000398, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) [ 430.151087][T12348] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 430.162265][T12349] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, &(0x7f0000000200)='-!!\x00') 08:21:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 430.707726][T12358] devpts: called with bogus options [ 430.803912][T12362] devpts: called with bogus options 08:21:35 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000001880)='/dev/ttyS3\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, 0x0, 0xfffffd6d) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 431.031279][T12367] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 431.048055][T12365] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:35 executing program 3: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x500, 0x0, 0x0) 08:21:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, 0x0, 0x0) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, 0x0, 0x0) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, &(0x7f0000000200)='-!!\x00') 08:21:36 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') openat(r0, &(0x7f00000000c0)='./file0\x00', 0x141242, 0x0) [ 432.718747][T12399] devpts: called with bogus options [ 432.772927][T12402] devpts: called with bogus options 08:21:37 executing program 4: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300), 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007f80)=[{{0x0, 0xe000008, &(0x7f0000000180)=[{&(0x7f0000000000)="94eb98c5f97e2c2a4a02408ccb88a96a52bbf810f9b72aa17225a6c6bcb1f56bc51ce9668fee7066d816af4c6bf88f7adff4c49f3dc6e467603e98d004b63403d6570cf7d036784cb892eb7750", 0x4d}, {&(0x7f00000003c0)="f0583ac29776b175c108434c251d2996f169fa34891154de372b60d30b7e13b8a820cc31b4dc8a98236205d5c5329b8482ae7ac5a999d57dc5a723cd5eede9b9edda4b522a6a4a42b8076e488ef139f0baa6bd32babe0c990c66a75c9956b8272a0ba6d52cbc094e996f6cb52e5bb9d2c5abeb1621f359b622fdbbe583c1d262bc28fc4d856e83a3b3cbcfcd83d8ed0c9184f31afac72189b6896a321993fdf79568ee4506113d22bef08fbc36aa5c9cbc600ffedd7d500aa3aa933dddaae7e82eac134d436af91d9a893a262388a7e8c3256a4042a07366998bc11e5884d9853f08f7eebebc4b41323144308cc64ae9913afe5bbed9765b08f447b723eb97199b2fd202ea2017e0cd5efa17f5e993396f29debd1159de0f8836d890b3d81d8cc2a3cf95b0910b6c739928a03a80284dda986c1d6f6899e445b5f8eec34985be9d75447646f44baf1321c3c112971c0caae973a32c05a69f091c9c9622e3e66d2458befc41e72805c8e7349d07e22f890db3d1f1409ef9f2027155844fbd4f7d104e62405dbce5a810181cd05072b94826780b6950180572e93543a736af99858cd6ed71ee4fe722e1e28c2329a6e2f1720bf8fecc96dd3434d6696851845630650548cb8d548a8cde246769913a743257954a8d4d9950ff419c25b5a2db3d817170d0ac70942acbf77bf9746f94bc45a07731ddb9b45d99994a649c3f7f19a75da137f0347babf5df5fea1cccc1392c0434f4cb80164a62e30eebc59f9f53e6f5673ad7753bfb50352ffd9541a943e2a9ac095e8321f7e48223e69398c9fb08429e37aae353cffa23de86fca4f74a5c15aa6d15acbe410341ff99132337400d65e5ab0b19dd7a68a74d69c2b44c7ad7d71e8c480e96c65f31c9bb3f1b1b9bd8a9d9e485cdcb361d5408461bb7eb42d22b8a140cda3239aa5033e57abe392ba62371cb35d49b5abe79587ed299709f542b4a08a72ffae9f488893e257ae1cd0cfc18e124bad5e476a3a18c97c40b571cdb511b69bfe60aad8a9909eb2a639d315b53e2cffcd13d04ca116aa88e90e7ce06658bca74921ee05461ae13076c8c51ae8fbd37eff7d61b8928069a469b1cd5076d9f156e84864e9f729dc8c6b4a967d8188138357a34e5eb1e350e4e4688170b5fa87c78e8a294dbf64d551a1a2e82eba19ac81bcf622a15c754725ae3b38c4240f9f5835aafd8ee6a95a9e83c11e68be8ad5835c49f0f623b168efdb670af3743a2bd64f7ed039f80dd1c9ad1d93d7ba6b43cd91a0339f95969f5bf4468757016f654ee67b07cd34cf60a643ca9e04770005a0025e24dcc14f5f712da46d5909714f73a7a3a64db16efa0b57fdec4acea474a8f5800b1dbbc264608aa6bdbc0cd0a21c2b4c7e7e7f825dc551389686b3e917926a48f1bc6a6695a5de4acc3a966bd33e7014327390db9a158271674a5f3d779195cb4ffc3e185d7b9e95eff5da68e89cdcc2b0bf1f390581f9dcc81db50382c69f811647307db2e033be601fc22a5cfd18679768111d3d8e98bc8f987db0c1911a3b39910d56abdead660cffa1c7e547d7868fb75796393f2748b102d79302e712e4f8e38d986626b2168151b80b32d6f8026831d4d00b52e519c6616711b17f95f4822329c151fc5deb482e98505385dd1fe855ddfed02bfba4caa14a8c0daa7be61d35a59499b02af98bf8ab586ad194229234c6528182e52e7abbb3ca22ed4b5e2e1b144d9a3ed3057b6e2383255e055b7317a96fb4261a48215b4a453d7edf9d11cef2e13dcc798e5b5f27f4a6bac604fe04fab212894888bd035749c91ce42bfbd7fb7df5211f77c42bfae9a077303503c890207ffb987f65b183ecb495fb242ceac7d8b546376b9a8d2f7baf71374a69bfd7cf20692a16d4155dff1a1a00e8b4488ebba6268d15ace5f13a580ab2f8308fbbee8722a77270e5fb7546d4b5493f2247b14aa2e0e4a927ecc8f9f", 0x574}], 0x2}}], 0x400000000000398, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) 08:21:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, 0x0, 0x0) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:37 executing program 5: getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300), 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000afc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000058c0)=""/174, 0xae}}], 0x2, 0x0, 0x0) 08:21:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0x1c) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) waitid(0x2, 0x0, 0x0, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x80) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000340), 0x4) r2 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x1, 0x4000) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000380)=0x5) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000300)={0x4}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000140)) 08:21:37 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) [ 433.297135][T12414] IPVS: ftp: loaded support on port[0] = 21 08:21:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280), 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 433.975151][T12445] __nla_validate_parse: 6 callbacks suppressed [ 433.975276][T12445] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x23, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0x1c) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) waitid(0x2, 0x0, 0x0, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x80) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000340)=0x2, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x0, 0x0}) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x1, 0x4000) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000380)=0x5) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000300)={0x4, r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000140)) [ 434.205066][T12449] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280), 0x4) r4 = dup(r2) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 434.420160][T12454] IPVS: ftp: loaded support on port[0] = 21 [ 434.568293][T12456] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 434.771098][T12465] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 434.811301][T12436] IPVS: ftp: loaded support on port[0] = 21 08:21:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 435.327421][T12481] IPVS: ftp: loaded support on port[0] = 21 [ 435.412746][T12507] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:40 executing program 4: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300), 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = dup(0xffffffffffffffff) sendfile(r2, r1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007f80)=[{{0x0, 0xe000008, &(0x7f0000000180)=[{&(0x7f0000000000)="94eb98c5f97e2c2a4a02408ccb88a96a52bbf810f9b72aa17225a6c6bcb1f56bc51ce9668fee7066d816af4c6bf88f7adff4c49f3dc6e467603e98d004b63403d6570cf7d036784cb892eb7750", 0x4d}, {&(0x7f00000003c0)="f0583ac29776b175c108434c251d2996f169fa34891154de372b60d30b7e13b8a820cc31b4dc8a98236205d5c5329b8482ae7ac5a999d57dc5a723cd5eede9b9edda4b522a6a4a42b8076e488ef139f0baa6bd32babe0c990c66a75c9956b8272a0ba6d52cbc094e996f6cb52e5bb9d2c5abeb1621f359b622fdbbe583c1d262bc28fc4d856e83a3b3cbcfcd83d8ed0c9184f31afac72189b6896a321993fdf79568ee4506113d22bef08fbc36aa5c9cbc600ffedd7d500aa3aa933dddaae7e82eac134d436af91d9a893a262388a7e8c3256a4042a07366998bc11e5884d9853f08f7eebebc4b41323144308cc64ae9913afe5bbed9765b08f447b723eb97199b2fd202ea2017e0cd5efa17f5e993396f29debd1159de0f8836d890b3d81d8cc2a3cf95b0910b6c739928a03a80284dda986c1d6f6899e445b5f8eec34985be9d75447646f44baf1321c3c112971c0caae973a32c05a69f091c9c9622e3e66d2458befc41e72805c8e7349d07e22f890db3d1f1409ef9f2027155844fbd4f7d104e62405dbce5a810181cd05072b94826780b6950180572e93543a736af99858cd6ed71ee4fe722e1e28c2329a6e2f1720bf8fecc96dd3434d6696851845630650548cb8d548a8cde246769913a743257954a8d4d9950ff419c25b5a2db3d817170d0ac70942acbf77bf9746f94bc45a07731ddb9b45d99994a649c3f7f19a75da137f0347babf5df5fea1cccc1392c0434f4cb80164a62e30eebc59f9f53e6f5673ad7753bfb50352ffd9541a943e2a9ac095e8321f7e48223e69398c9fb08429e37aae353cffa23de86fca4f74a5c15aa6d15acbe410341ff99132337400d65e5ab0b19dd7a68a74d69c2b44c7ad7d71e8c480e96c65f31c9bb3f1b1b9bd8a9d9e485cdcb361d5408461bb7eb42d22b8a140cda3239aa5033e57abe392ba62371cb35d49b5abe79587ed299709f542b4a08a72ffae9f488893e257ae1cd0cfc18e124bad5e476a3a18c97c40b571cdb511b69bfe60aad8a9909eb2a639d315b53e2cffcd13d04ca116aa88e90e7ce06658bca74921ee05461ae13076c8c51ae8fbd37eff7d61b8928069a469b1cd5076d9f156e84864e9f729dc8c6b4a967d8188138357a34e5eb1e350e4e4688170b5fa87c78e8a294dbf64d551a1a2e82eba19ac81bcf622a15c754725ae3b38c4240f9f5835aafd8ee6a95a9e83c11e68be8ad5835c49f0f623b168efdb670af3743a2bd64f7ed039f80dd1c9ad1d93d7ba6b43cd91a0339f95969f5bf4468757016f654ee67b07cd34cf60a643ca9e04770005a0025e24dcc14f5f712da46d5909714f73a7a3a64db16efa0b57fdec4acea474a8f5800b1dbbc264608aa6bdbc0cd0a21c2b4c7e7e7f825dc551389686b3e917926a48f1bc6a6695a5de4acc3a966bd33e7014327390db9a158271674a5f3d779195cb4ffc3e185d7b9e95eff5da68e89cdcc2b0bf1f390581f9dcc81db50382c69f811647307db2e033be601fc22a5cfd18679768111d3d8e98bc8f987db0c1911a3b39910d56abdead660cffa1c7e547d7868fb75796393f2748b102d79302e712e4f8e38d986626b2168151b80b32d6f8026831d4d00b52e519c6616711b17f95f4822329c151fc5deb482e98505385dd1fe855ddfed02bfba4caa14a8c0daa7be61d35a59499b02af98bf8ab586ad194229234c6528182e52e7abbb3ca22ed4b5e2e1b144d9a3ed3057b6e2383255e055b7317a96fb4261a48215b4a453d7edf9d11cef2e13dcc798e5b5f27f4a6bac604fe04fab212894888bd035749c91ce42bfbd7fb7df5211f77c42bfae9a077303503c890207ffb987f65b183ecb495fb242ceac7d8b546376b9a8d2f7baf71374a69bfd7cf20692a16d4155dff1a1a00e8b4488ebba6268d15ace5f13a580ab2f8308fbbee8722a77270e5fb7546d4b5493f2247b14aa2e0e4a927ecc8f9f", 0x574}], 0x2}}], 0x400000000000398, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000afc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000058c0)=""/174, 0xae}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xd) 08:21:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r3, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r4 = dup(r2) recvmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r4, 0x8004700b, &(0x7f0000000040)) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r5, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0045627, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 08:21:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x3, 0x11, r1, 0x0) [ 436.088742][T12535] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 436.186346][T12537] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r3, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:40 executing program 3: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300), 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = dup(0xffffffffffffffff) sendfile(r2, r1, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007f80)=[{{0x0, 0xe000008, &(0x7f0000000180)=[{&(0x7f0000000000)="94eb98c5f97e2c2a4a02408ccb88a96a52bbf810f9b72aa17225a6c6bcb1f56bc51ce9668fee7066d816af4c6bf88f7adff4c49f3dc6e467603e98d004b63403d6570cf7d036784cb892eb7750", 0x4d}, {&(0x7f00000003c0)="f0583ac29776b175c108434c251d2996f169fa34891154de372b60d30b7e13b8a820cc31b4dc8a98236205d5c5329b8482ae7ac5a999d57dc5a723cd5eede9b9edda4b522a6a4a42b8076e488ef139f0baa6bd32babe0c990c66a75c9956b8272a0ba6d52cbc094e996f6cb52e5bb9d2c5abeb1621f359b622fdbbe583c1d262bc28fc4d856e83a3b3cbcfcd83d8ed0c9184f31afac72189b6896a321993fdf79568ee4506113d22bef08fbc36aa5c9cbc600ffedd7d500aa3aa933dddaae7e82eac134d436af91d9a893a262388a7e8c3256a4042a07366998bc11e5884d9853f08f7eebebc4b41323144308cc64ae9913afe5bbed9765b08f447b723eb97199b2fd202ea2017e0cd5efa17f5e993396f29debd1159de0f8836d890b3d81d8cc2a3cf95b0910b6c739928a03a80284dda986c1d6f6899e445b5f8eec34985be9d75447646f44baf1321c3c112971c0caae973a32c05a69f091c9c9622e3e66d2458befc41e72805c8e7349d07e22f890db3d1f1409ef9f2027155844fbd4f7d104e62405dbce5a810181cd05072b94826780b6950180572e93543a736af99858cd6ed71ee4fe722e1e28c2329a6e2f1720bf8fecc96dd3434d6696851845630650548cb8d548a8cde246769913a743257954a8d4d9950ff419c25b5a2db3d817170d0ac70942acbf77bf9746f94bc45a07731ddb9b45d99994a649c3f7f19a75da137f0347babf5df5fea1cccc1392c0434f4cb80164a62e30eebc59f9f53e6f5673ad7753bfb50352ffd9541a943e2a9ac095e8321f7e48223e69398c9fb08429e37aae353cffa23de86fca4f74a5c15aa6d15acbe410341ff99132337400d65e5ab0b19dd7a68a74d69c2b44c7ad7d71e8c480e96c65f31c9bb3f1b1b9bd8a9d9e485cdcb361d5408461bb7eb42d22b8a140cda3239aa5033e57abe392ba62371cb35d49b5abe79587ed299709f542b4a08a72ffae9f488893e257ae1cd0cfc18e124bad5e476a3a18c97c40b571cdb511b69bfe60aad8a9909eb2a639d315b53e2cffcd13d04ca116aa88e90e7ce06658bca74921ee05461ae13076c8c51ae8fbd37eff7d61b8928069a469b1cd5076d9f156e84864e9f729dc8c6b4a967d8188138357a34e5eb1e350e4e4688170b5fa87c78e8a294dbf64d551a1a2e82eba19ac81bcf622a15c754725ae3b38c4240f9f5835aafd8ee6a95a9e83c11e68be8ad5835c49f0f623b168efdb670af3743a2bd64f7ed039f80dd1c9ad1d93d7ba6b43cd91a0339f95969f5bf4468757016f654ee67b07cd34cf60a643ca9e04770005a0025e24dcc14f5f712da46d5909714f73a7a3a64db16efa0b57fdec4acea474a8f5800b1dbbc264608aa6bdbc0cd0a21c2b4c7e7e7f825dc551389686b3e917926a48f1bc6a6695a5de4acc3a966bd33e7014327390db9a158271674a5f3d779195cb4ffc3e185d7b9e95eff5da68e89cdcc2b0bf1f390581f9dcc81db50382c69f811647307db2e033be601fc22a5cfd18679768111d3d8e98bc8f987db0c1911a3b39910d56abdead660cffa1c7e547d7868fb75796393f2748b102d79302e712e4f8e38d986626b2168151b80b32d6f8026831d4d00b52e519c6616711b17f95f4822329c151fc5deb482e98505385dd1fe855ddfed02bfba4caa14a8c0daa7be61d35a59499b02af98bf8ab586ad194229234c6528182e52e7abbb3ca22ed4b5e2e1b144d9a3ed3057b6e2383255e055b7317a96fb4261a48215b4a453d7edf9d11cef2e13dcc798e5b5f27f4a6bac604fe04fab212894888bd035749c91ce42bfbd7fb7df5211f77c42bfae9a077303503c890207ffb987f65b183ecb495fb242ceac7d8b546376b9a8d2f7baf71374a69bfd7cf20692a16d4155dff1a1a00e8b4488ebba6268d15ace5f13a580ab2f8308fbbee8722a77270e5fb7546d4b5493f2247b14aa2e0e4a927ecc8f9f", 0x574}], 0x2}}], 0x400000000000398, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000afc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000058c0)=""/174, 0xae}}], 0x2, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xd) [ 436.591356][T12552] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 436.737545][T12553] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$drirender128(0xffffff9c, &(0x7f0000000100)='/dev/dri/renderD128\x00', 0x4000, 0x0) 08:21:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r3, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 437.554985][T12568] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:42 executing program 4: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300), 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = dup(0xffffffffffffffff) sendfile(r2, r1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007f80)=[{{0x0, 0xe000008, &(0x7f0000000180)=[{&(0x7f0000000000)="94eb98c5f97e2c2a4a02408ccb88a96a52bbf810f9b72aa17225a6c6bcb1f56bc51ce9668fee7066d816af4c6bf88f7adff4c49f3dc6e467603e98d004b63403d6570cf7d036784cb892eb7750", 0x4d}, {&(0x7f00000003c0)="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", 0x574}], 0x2}}], 0x400000000000398, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000afc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000058c0)=""/174, 0xae}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xd) 08:21:42 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0185648, &(0x7f0000000140)={0x0, 0xd2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x0, 0x0, [], @p_u16=&(0x7f00000000c0)}}) 08:21:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r3, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:43 executing program 5: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x31, 0x58001010, r1, 0x0) 08:21:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:43 executing program 3: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300), 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0xfffffd6d) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = dup(0xffffffffffffffff) sendfile(r2, r1, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007f80)=[{{0x0, 0xe000008, &(0x7f0000000180)=[{&(0x7f0000000000)="94eb98c5f97e2c2a4a02408ccb88a96a52bbf810f9b72aa17225a6c6bcb1f56bc51ce9668fee7066d816af4c6bf88f7adff4c49f3dc6e467603e98d004b63403d6570cf7d036784cb892eb7750", 0x4d}, {&(0x7f00000003c0)="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", 0x574}], 0x2}}], 0x400000000000398, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000afc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000058c0)=""/174, 0xae}}], 0x2, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xd) 08:21:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x4f, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) [ 439.307996][T12598] __nla_validate_parse: 5 callbacks suppressed [ 439.308126][T12598] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 439.501286][T12602] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:44 executing program 4: 08:21:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x4f, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 440.174369][T12619] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 440.214971][T12620] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:21:44 executing program 4: 08:21:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:45 executing program 3: [ 440.582876][T12630] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:45 executing program 4: 08:21:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x4f, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:45 executing program 3: 08:21:45 executing program 4: [ 441.327868][T12649] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x4f, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:45 executing program 3: 08:21:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:46 executing program 4: 08:21:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 441.852049][T12664] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:46 executing program 3: 08:21:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:46 executing program 4: 08:21:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:46 executing program 3: 08:21:46 executing program 4: 08:21:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) [ 442.450917][T12675] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:47 executing program 3: 08:21:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:47 executing program 4: [ 443.090160][T12689] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:47 executing program 3: 08:21:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:47 executing program 4: 08:21:47 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, 0x0, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:48 executing program 3: 08:21:48 executing program 4: [ 443.792842][T12708] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:48 executing program 5: r0 = io_uring_setup(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, 0x0, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:48 executing program 3: 08:21:48 executing program 4: 08:21:48 executing program 5: r0 = io_uring_setup(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) [ 444.322209][T12721] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, 0x0, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:49 executing program 4: 08:21:49 executing program 3: 08:21:49 executing program 5: r0 = io_uring_setup(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 444.895331][T12733] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:49 executing program 4: 08:21:49 executing program 3: 08:21:49 executing program 5: r0 = io_uring_setup(0x4f, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 445.876943][T12750] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:50 executing program 3: 08:21:50 executing program 4: 08:21:50 executing program 5: r0 = io_uring_setup(0x4f, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) [ 446.075367][T12754] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:50 executing program 3: 08:21:50 executing program 4: 08:21:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:51 executing program 5: r0 = io_uring_setup(0x4f, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:51 executing program 3: 08:21:51 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x220}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:51 executing program 4: 08:21:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 447.046804][T12772] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:51 executing program 3: [ 447.398928][T12786] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:51 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:52 executing program 4: 08:21:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:52 executing program 3: 08:21:52 executing program 4: 08:21:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:52 executing program 5: io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:21:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:52 executing program 3: [ 448.282057][T12805] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:52 executing program 4: 08:21:53 executing program 3: 08:21:53 executing program 5: io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) [ 448.651298][T12817] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:53 executing program 4: 08:21:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:53 executing program 3: 08:21:53 executing program 4: 08:21:53 executing program 5: io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) [ 449.426088][T12837] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:53 executing program 3: 08:21:53 executing program 4: 08:21:54 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 08:21:54 executing program 4: [ 449.796828][T12851] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:54 executing program 3: 08:21:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:54 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 08:21:54 executing program 3: 08:21:54 executing program 4: [ 450.601322][T12873] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:55 executing program 3: 08:21:55 executing program 4: 08:21:55 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 08:21:55 executing program 4: [ 450.982835][T12883] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:55 executing program 3: 08:21:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00", 0x14}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:55 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}], 0x1) 08:21:55 executing program 4: 08:21:55 executing program 3: [ 451.689111][T12903] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:56 executing program 4: 08:21:56 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}], 0x1) 08:21:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00", 0x14}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:56 executing program 3: 08:21:56 executing program 4: 08:21:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00", 0x14}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 452.201589][T12917] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:56 executing program 3: 08:21:56 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}], 0x1) 08:21:56 executing program 4: 08:21:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e003903", 0x1e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 452.810957][T12934] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:57 executing program 3: 08:21:57 executing program 4: 08:21:57 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {0x0}], 0x2) 08:21:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e003903", 0x1e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:57 executing program 4: 08:21:57 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {0x0}], 0x2) [ 453.326336][T12947] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:58 executing program 3: 08:21:58 executing program 4: 08:21:58 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/199, 0xc7}, {0x0}], 0x2) 08:21:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e003903", 0x1e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 454.077605][T12972] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:58 executing program 4: 08:21:58 executing program 3: 08:21:58 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/125, 0x7d}], 0x1) 08:21:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d02", 0x23}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:58 executing program 4: 08:21:58 executing program 3: [ 454.555890][T12988] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:21:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:21:59 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/125, 0x7d}], 0x1) 08:21:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d02", 0x23}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:59 executing program 4: 08:21:59 executing program 3: [ 455.233847][T13005] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:21:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d02", 0x23}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:21:59 executing program 4: 08:21:59 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/125, 0x7d}], 0x1) 08:21:59 executing program 3: 08:22:00 executing program 4: 08:22:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff05", 0x26}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 455.727631][T13020] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:00 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:22:00 executing program 3: 08:22:00 executing program 4: 08:22:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff05", 0x26}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 456.325079][T13037] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:22:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:01 executing program 3: 08:22:01 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:22:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff05", 0x26}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:01 executing program 4: 08:22:01 executing program 3: [ 456.872687][T13053] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff0500", 0x27}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:01 executing program 4: 08:22:01 executing program 5: r0 = io_uring_setup(0x4f, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f00000003c0)=""/125, 0x7d}], 0x2) 08:22:01 executing program 3: 08:22:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff0500", 0x27}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 457.561487][T13068] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:22:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:02 executing program 4: 08:22:02 executing program 5: 08:22:02 executing program 3: 08:22:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff0500", 0x27}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:02 executing program 3: 08:22:02 executing program 5: [ 458.092562][T13078] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:02 executing program 4: 08:22:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x28}], 0x1}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:02 executing program 5: 08:22:02 executing program 3: [ 458.793744][T13092] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:22:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:03 executing program 4: 08:22:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x28}], 0x1}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:03 executing program 3: 08:22:03 executing program 5: 08:22:03 executing program 5: 08:22:03 executing program 4: [ 459.362150][T13103] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x28}], 0x1}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:04 executing program 3: 08:22:04 executing program 4: 08:22:04 executing program 5: [ 459.858223][T13114] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:22:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:04 executing program 3: 08:22:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:04 executing program 4: 08:22:04 executing program 5: [ 460.255714][T13122] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:04 executing program 5: 08:22:04 executing program 4: [ 460.433959][T13126] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:05 executing program 3: 08:22:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:05 executing program 5: 08:22:05 executing program 4: [ 460.824465][T13133] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 460.972366][T13137] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:22:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa409}, 0x14) 08:22:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:05 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 08:22:05 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000000000)=0x4000a, 0x4) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) [ 461.478819][T13150] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 461.602021][T13156] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:06 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x1202, &(0x7f0000000080)=ANY=[@ANYRES32], 0x8) 08:22:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x0, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:06 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000200), 0x8) 08:22:06 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) dup2(r0, r1) execve(0x0, 0x0, 0x0) [ 462.067572][T13165] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 462.208244][T13176] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.217107][T13176] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.225029][T13176] device bridge0 entered promiscuous mode 08:22:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x0, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:06 executing program 5: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES16], 0x3ef) 08:22:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001480)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 08:22:07 executing program 4: r0 = socket(0x2, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001500)={&(0x7f0000001300)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=[@sndrcv={0x2c}], 0x2c}, 0x0) [ 462.778468][T13179] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 462.788372][T13179] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.795925][T13179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.803918][T13179] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.811183][T13179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.819486][T13179] device bridge0 left promiscuous mode [ 462.828810][T13191] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:07 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x1c}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000001b80)={&(0x7f00000019c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x20100) 08:22:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x0, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:07 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x1202, &(0x7f0000000080)=ANY=[@ANYRES32=r2], 0x8) 08:22:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:07 executing program 4: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f0000000040)=ANY=[], 0x3ef) 08:22:08 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) [ 463.611189][T13220] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.618887][T13220] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.627065][T13220] device bridge0 entered promiscuous mode 08:22:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0x0, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:08 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0xf}, 0xc) 08:22:08 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x1202, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x8) 08:22:08 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x1202, &(0x7f0000000080)=ANY=[@ANYBLOB="02"], 0x8) [ 464.242280][T13224] bridge0: port 2(bridge_slave_1) entered blocking state [ 464.249676][T13224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 464.257816][T13224] bridge0: port 1(bridge_slave_0) entered blocking state [ 464.265203][T13224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 464.273681][T13224] device bridge0 left promiscuous mode [ 464.282914][ T9804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:22:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0x0, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1c000000840000000a0000000000000000000080"], 0x1c}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000001b80)={&(0x7f00000019c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x20100) 08:22:09 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x1202, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32], 0x8) 08:22:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 464.865075][T13263] __nla_validate_parse: 5 callbacks suppressed [ 464.865111][T13263] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:09 executing program 5: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0xbaa) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) write$binfmt_elf64(r1, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 08:22:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0x0, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 465.655674][T13280] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 465.721298][T13286] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.728994][T13286] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.736920][T13286] device bridge0 entered promiscuous mode 08:22:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x0, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:10 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 08:22:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd653}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/wireless\x00') lseek(r0, 0x800000000000006, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000700)}, {&(0x7f0000000080)="1098a9f12ee0f6187a5d41e5e0fb5b429f937bb59d72ad98d920c579c5297714e9a528fdf966303256bfdda58e721cb20b2775a2aabcf4521f0e4a789a3a933915c659da45ced680ade7b05ae718e35226bda7f0553e04e3b0651e97478583e407741de8cc58f75181e6ce676ff83106b41fab49e2039665cbfc527f3902d1f60c097833b8f2a5fb6454df8342b27e18a3eb533216f0e332ff6354e346457e0e7ad84293a3697ec4d27abf187fc7b91a41ecce4e1bc84e20", 0xb8}, {&(0x7f0000000140)}], 0x3, 0x8) mlockall(0x5) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') preadv(r1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) lseek(0xffffffffffffffff, 0x800000000000006, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000440)=0x1, 0x4) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, 0x0) [ 466.162964][T13297] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 466.175525][T13291] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 466.185470][T13291] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.192787][T13291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.201018][T13291] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.208402][T13291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.216613][T13291] device bridge0 left promiscuous mode [ 466.227040][T13289] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x0, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 466.886740][T13311] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x0, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:11 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f00000004c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) [ 467.150294][T13315] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 467.177582][ T9026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 08:22:11 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000100)="c5", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="1c000000840000000a0000000000000000000080"], 0x1c}, 0x0) [ 467.349203][T13320] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.356861][T13320] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.365011][T13320] device bridge0 entered promiscuous mode 08:22:12 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f0000000040), 0xc) [ 467.995972][T13321] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 468.006133][T13321] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.013494][T13321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.021338][T13321] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.028648][T13321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.037034][T13321] device bridge0 left promiscuous mode 08:22:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:12 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000500)) openat$vcs(0xffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200140, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 468.049587][T13331] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:12 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {}, [{}, {}, {}, {}], {}, [{}, {}, {}]}, 0x5c, 0x0) [ 468.418937][T13347] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') lseek(r0, 0x800000000000006, 0x0) ftruncate(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 08:22:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@mcast2, 0x0, r2}) 08:22:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 469.051539][T13367] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.059200][T13367] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.066896][T13367] device bridge0 entered promiscuous mode 08:22:13 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') lseek(r0, 0x800000000000006, 0x0) 08:22:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:13 executing program 4: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 469.582896][T13369] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.590183][T13369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.598233][T13369] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.605692][T13369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.614055][T13369] device bridge0 left promiscuous mode 08:22:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed1736b533f9e1623a7cf73af21532ad62f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460000000079aed75d492b415bcee00a06dc9d8e99ad2f81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d86a6a402ce783aa5bfb89e6f2c64884b3c5d052563def19f8b1200eaf284124422d8a4d302e96ea0cdfe02eaf9b66be609c68408e2b060e57495c8613f2351a27be673948c4b8c75a568955bf9da055a6cd0bf8e3b1bf111ed414f039ca4a74e7875034cc371152fa82459bc507495c9a65917e0d952326e50de1e4c", 0xe8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x0, @phonet, @ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, @in={0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:22:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 470.121094][T13390] __nla_validate_parse: 4 callbacks suppressed [ 470.121197][T13390] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:14 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) ftruncate(r2, 0x0) 08:22:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) [ 470.411129][T13400] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.418834][T13400] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.426617][T13400] device bridge0 entered promiscuous mode 08:22:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="24000000150007031dfffd946fa2830002200a0009000000741d8568201ba3a20400ff7e280000002600ff1803abf53e21bca91d5384d97f9d22a839ddb89e4b34947fd7cb91d34e2009a05f", 0x4c}], 0x1}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 470.882362][T13401] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 470.892245][T13401] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.899482][T13401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.907539][T13401] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.914859][T13401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.923158][T13401] device bridge0 left promiscuous mode [ 470.939188][T13409] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 471.016905][T13415] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 08:22:15 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = inotify_init() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x81000626) 08:22:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000780)={0x0, 0xfb, 0x39, 0x0, 0x0, "61e04ac0f4cbf7c5d29e999900", "c2a35bf6923c6b19a86a00a0cef97c17be8e8be7da3699d046384cda8973ad6ed8660798"}, 0x39, 0x0) [ 471.536874][T13425] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=""/15, 0xf}}, {{0x0, 0x0, 0x0}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003540)=""/4096, 0x1000}, 0xb1}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket(0xa, 0x2400000001, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000005c0)={0x0, {}, {{0x2, 0x0, @broadcast}}}, 0x108) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0000000000000000a129a74db459d49fdda605ba775c5baeba3919b4c7956ea4c07814dcbf8f15040665ee70b9db59b20f44683f4428c8016caf50b833dd8997188ea72de3ef947c74bdbfcf1e144330b59dbc9edcbbbca4eb06e633ba7ab71886caed46a3e91cbf4457d83b19b8b822d9479e0692372482a47acfb19282dd4d059e15e32e3f85a92048deafb05dc3a29e7561d0eadf50c4cb85a1a11742ed415e8a4687a297cc8e72399d58942517f1af2c40b4ec436a3ba1c6b32469ead3417dd23deae5724c5503876d9bed673c8aec5cd648e6e51111418952a1054a3eda0767765e0d3310"], 0x62, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, 0x0, 0x8000) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 08:22:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) [ 471.741007][T13429] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.748671][T13429] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.756453][T13429] device bridge0 entered promiscuous mode [ 472.093351][T13431] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 472.103459][T13431] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.110696][T13431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.118688][T13431] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.126665][T13431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.135046][T13431] device bridge0 left promiscuous mode [ 472.155153][T13437] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000560007038dfffd946f610500070052f533e7bdbaa9a80000000000000400ff7e", 0x24}], 0x1}, 0x0) 08:22:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500020000e8fe02080100010800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 08:22:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0x0, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=""/15, 0xf}}, {{0x0, 0x0, 0x0}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003540)=""/4096, 0x1000}, 0xb1}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket(0xa, 0x2400000001, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000005c0)={0x0, {}, {{0x2, 0x0, @broadcast}}}, 0x108) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0000000000000000a129a74db459d49fdda605ba775c5baeba3919b4c7956ea4c07814dcbf8f15040665ee70b9db59b20f44683f4428c8016caf50b833dd8997188ea72de3ef947c74bdbfcf1e144330b59dbc9edcbbbca4eb06e633ba7ab71886caed46a3e91cbf4457d83b19b8b822d9479e0692372482a47acfb19282dd4d059e15e32e3f85a92048deafb05dc3a29e7561d0eadf50c4cb85a1a11742ed415e8a4687a297cc8e72399d58942517f1af2c40b4ec436a3ba1c6b32469ead3417dd23deae5724c5503876d9bed673c8aec5cd648e6e51111418952a1054a3eda0767765e0d3310"], 0x62, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, 0x0, 0x8000) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) [ 473.248261][T13451] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 473.768566][T13460] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.776216][T13460] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.784051][T13460] device bridge0 entered promiscuous mode [ 473.902677][T13457] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 473.913650][T13461] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 473.937258][T13464] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.944681][T13464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.952630][T13464] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.960976][T13464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.969544][T13464] device bridge0 left promiscuous mode 08:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0x0, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed1736b533f9e1623a7cf73af21532ad62f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460000000079aed75d492b415bcee00a06dc9d8e99ad2f81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d86a6a402ce783aa5bfb89e6f2c64884b3c5d052563def19f8b1200eaf284124422d8a4d302e96ea0cdfe02eaf9b66be609c68408e2b060e57495c8613f2351a27be673948c4b8c75a568955bf9da055a6cd0bf8e3b1bf111ed414f039ca4a74e7875034cc371152fa82459bc507495c9a65917e0d952326e50de1e4c276d4041b805c298b1bf280a6d6706", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x0, @phonet, @tipc=@name, @in={0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:22:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000000)=""/2, 0x2}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='status\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 08:22:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000080)=""/246, 0xf6}], 0x1) 08:22:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0x0, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 474.806829][T13496] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.814790][T13496] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.822668][T13496] device bridge0 entered promiscuous mode 08:22:19 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x81000626) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa20400, 0x0) [ 475.265452][T13499] __nla_validate_parse: 4 callbacks suppressed [ 475.265484][T13499] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 475.282052][T13499] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.289330][T13499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.297316][T13499] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.304807][T13499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.313576][T13499] device bridge0 left promiscuous mode [ 475.334415][T13498] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:19 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x0, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 475.848049][T13523] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x0, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r2, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x40087708, &(0x7f0000000280)) ioctl$ASHMEM_SET_NAME(r2, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r2, 0x40087708, &(0x7f0000000180)='\x00\x00\x03\x00\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') [ 476.010218][T13527] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.017782][T13527] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.025589][T13527] device bridge0 entered promiscuous mode [ 476.778281][T13528] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.786425][T13528] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.794560][T13528] device bridge0 entered promiscuous mode [ 476.975358][T13531] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 476.985274][T13531] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.992930][T13531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.000809][T13531] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.008330][T13531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.016677][T13531] device bridge0 left promiscuous mode [ 477.032230][T13530] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 477.042361][T13530] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.049790][T13530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.058262][T13530] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.065629][T13530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.075248][T13530] device bridge0 left promiscuous mode [ 477.086207][T13535] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 08:22:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) read$rfkill(r2, &(0x7f00000000c0), 0x8) 08:22:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c71a6ca3275b5a6d72433e9fc8156e4301f011aab72d487603bbeda35ec33323927365eb9805446cbb8a9382810988f81902cad41eb1e2f43b80cebdf37d1021fd119323a8106f99fec433bf3dfedd3662e1ac6fb12a1af1efcc5dee0b62a07517f6cccc64da922ac04ce3fc99fa8ec1ea9b336c06e6e7d9cf470fa250c0745e287cd78e"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000000000000000010000000001000"}) 08:22:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003540)=""/4096, 0x1000}, 0xb1}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket(0xa, 0x2400000001, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000005c0)={0x0, {}, {{0x2, 0x0, @broadcast}}}, 0x108) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0000000000000000a129a74db459d49fdda605ba775c5baeba3919b4c7956ea4c07814dcbf8f15040665ee70b9db59b20f44683f4428c8016caf50b833dd8997188ea72de3ef947c74bdbfcf1e144330b59dbc9edcbbbca4eb06e633ba7ab71886caed46a3e91cbf4457d83b19b8b822d9479e0692372482a47acfb19282dd4d059e15e32e3f85a92048deafb05dc3a29e7561d0eadf50c4cb85a1a11742ed415e8a4687a297cc8e72399d58942517f1af2c40b4ec436a3ba1c6b32469ead3417dd23deae5724c5503876d9bed673c8aec5cd648e6e51111418952a1054a3eda0767765e0d3310bb70b601866a00"], 0x62, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, 0x0, 0x8000) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 08:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x0, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r4, 0x29, 0x50, &(0x7f0000000280)=0xfffffff8, 0x4) r5 = dup(r3) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)}, 0x12141) ioctl$RTC_IRQP_READ(r5, 0x8004700b, &(0x7f0000000040)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) clock_gettime(0x0, &(0x7f00000000c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r6, 0x0, &(0x7f0000000180)={0xa4f, 0x2, [], @value=0xd4e9}}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) [ 477.689464][T13558] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 477.721210][T13562] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.729183][T13562] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.736928][T13562] device bridge0 entered promiscuous mode 08:22:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c71a6ca3275b5a6d72433e9fc8156e4301f011aab72d487603bbeda35ec33323927365eb9805446cbb8a9382810988f81902cad41eb1e2f43b80cebdf37d1021fd119323a8106f99fec433bf3dfedd3662e1ac6fb12a1af1efcc5dee0b62a07517f6cccc64da922ac04ce3fc99fa8ec1ea9b336c06e6e7d9cf470fa250c0745e287cd78e"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000000000000000010000000001000"}) 08:22:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x408e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {}, [{}, {}, {}, {}], {}, [{}, {}, {}]}, 0x5c, 0x0) 08:22:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f0000000240)={r1, 0xfffffffffffffffb, 0x4, 0x4}) setsockopt$inet6_int(r2, 0x29, 0x50, &(0x7f0000000280), 0x4) r3 = dup(0xffffffffffffffff) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x368, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f00000001c0)={0x9e0000, 0xec19, 0x7, r4, 0x0, &(0x7f0000000180)={0xa4f, 0x2}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:22:23 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {}, [{}, {}, {}, {}], {}, [{}, {}, {}]}, 0x5c, 0x0) 08:22:23 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000) [ 478.590876][T13565] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.598465][T13565] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.606433][T13565] device bridge0 entered promiscuous mode [ 478.716477][T13588] ===================================================== [ 478.723472][T13588] BUG: KMSAN: uninit-value in fuse_dev_do_write+0xcc8/0xc490 [ 478.732771][T13588] CPU: 1 PID: 13588 Comm: syz-executor.4 Not tainted 5.8.0-rc5-syzkaller #0 [ 478.741445][T13588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.751507][T13588] Call Trace: [ 478.754811][T13588] dump_stack+0x1df/0x240 [ 478.759154][T13588] kmsan_report+0xf7/0x1e0 [ 478.763675][T13588] __msan_warning+0x58/0xa0 [ 478.768215][T13588] fuse_dev_do_write+0xcc8/0xc490 [ 478.773245][T13588] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 478.779060][T13588] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 478.785133][T13588] ? __kmalloc_node+0x233/0x11f0 [ 478.790099][T13588] ? kmsan_get_metadata+0x4f/0x180 [ 478.795226][T13588] fuse_dev_splice_write+0x1020/0x1230 [ 478.800697][T13588] ? do_splice_to+0x1384/0x14f0 [ 478.805591][T13588] ? fuse_dev_fasync+0x170/0x170 [ 478.810538][T13588] direct_splice_actor+0x1fd/0x580 [ 478.815662][T13588] ? kmsan_get_metadata+0x4f/0x180 [ 478.820785][T13588] splice_direct_to_actor+0x6b2/0xf50 [ 478.827202][T13588] ? do_splice_direct+0x580/0x580 [ 478.832337][T13588] do_splice_direct+0x342/0x580 [ 478.837204][T13588] do_sendfile+0x101b/0x1d40 [ 478.841820][T13588] __se_compat_sys_sendfile+0x301/0x3c0 [ 478.847381][T13588] ? kmsan_get_metadata+0x11d/0x180 [ 478.852583][T13588] ? __ia32_sys_sendfile64+0x70/0x70 [ 478.857878][T13588] __ia32_compat_sys_sendfile+0x56/0x70 [ 478.863427][T13588] __do_fast_syscall_32+0x2aa/0x400 [ 478.868628][T13588] do_fast_syscall_32+0x6b/0xd0 [ 478.873468][T13588] do_SYSENTER_32+0x73/0x90 [ 478.877961][T13588] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 478.884271][T13588] RIP: 0023:0xf7f8a549 [ 478.888317][T13588] Code: Bad RIP value. [ 478.892367][T13588] RSP: 002b:00000000f5d850cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 478.900787][T13588] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000004 [ 478.908744][T13588] RDX: 0000000000000000 RSI: 0000000000008000 RDI: 0000000000000000 [ 478.916712][T13588] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 478.924700][T13588] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 478.932664][T13588] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 478.940631][T13588] [ 478.942943][T13588] Uninit was stored to memory at: [ 478.948045][T13588] kmsan_internal_chain_origin+0xad/0x130 [ 478.953754][T13588] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 478.959717][T13588] kmsan_memcpy_metadata+0xb/0x10 [ 478.964725][T13588] __msan_memcpy+0x43/0x50 [ 478.970171][T13588] fuse_dev_do_write+0x4e6/0xc490 [ 478.975196][T13588] fuse_dev_splice_write+0x1020/0x1230 [ 478.980638][T13588] direct_splice_actor+0x1fd/0x580 [ 478.985732][T13588] splice_direct_to_actor+0x6b2/0xf50 [ 478.991094][T13588] do_splice_direct+0x342/0x580 [ 478.995929][T13588] do_sendfile+0x101b/0x1d40 [ 479.000674][T13588] __se_compat_sys_sendfile+0x301/0x3c0 [ 479.006199][T13588] __ia32_compat_sys_sendfile+0x56/0x70 [ 479.011732][T13588] __do_fast_syscall_32+0x2aa/0x400 [ 479.016933][T13588] do_fast_syscall_32+0x6b/0xd0 [ 479.021772][T13588] do_SYSENTER_32+0x73/0x90 [ 479.027115][T13588] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 479.033425][T13588] [ 479.035736][T13588] Uninit was created at: [ 479.040148][T13588] kmsan_save_stack_with_flags+0x3c/0x90 [ 479.045862][T13588] kmsan_alloc_page+0xb9/0x180 [ 479.050613][T13588] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 479.056143][T13588] alloc_pages_current+0x672/0x990 [ 479.061238][T13588] push_pipe+0x605/0xb70 [ 479.065464][T13588] iov_iter_get_pages_alloc+0x18a9/0x21c0 [ 479.071169][T13588] do_splice_to+0x4fc/0x14f0 [ 479.075743][T13588] splice_direct_to_actor+0x45c/0xf50 [ 479.081102][T13588] do_splice_direct+0x342/0x580 [ 479.085952][T13588] do_sendfile+0x101b/0x1d40 [ 479.090526][T13588] __se_compat_sys_sendfile+0x301/0x3c0 [ 479.096069][T13588] __ia32_compat_sys_sendfile+0x56/0x70 [ 479.101598][T13588] __do_fast_syscall_32+0x2aa/0x400 [ 479.106780][T13588] do_fast_syscall_32+0x6b/0xd0 [ 479.111618][T13588] do_SYSENTER_32+0x73/0x90 [ 479.116106][T13588] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 479.122425][T13588] ===================================================== [ 479.129334][T13588] Disabling lock debugging due to kernel taint [ 479.135469][T13588] Kernel panic - not syncing: panic_on_warn set ... [ 479.142045][T13588] CPU: 1 PID: 13588 Comm: syz-executor.4 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 479.152084][T13588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.162119][T13588] Call Trace: [ 479.165398][T13588] dump_stack+0x1df/0x240 [ 479.169719][T13588] panic+0x3d5/0xc3e [ 479.173620][T13588] kmsan_report+0x1df/0x1e0 [ 479.178115][T13588] __msan_warning+0x58/0xa0 [ 479.182606][T13588] fuse_dev_do_write+0xcc8/0xc490 [ 479.187618][T13588] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 479.193428][T13588] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 479.199501][T13588] ? __kmalloc_node+0x233/0x11f0 [ 479.205074][T13588] ? kmsan_get_metadata+0x4f/0x180 [ 479.210175][T13588] fuse_dev_splice_write+0x1020/0x1230 [ 479.215621][T13588] ? do_splice_to+0x1384/0x14f0 [ 479.220477][T13588] ? fuse_dev_fasync+0x170/0x170 [ 479.225414][T13588] direct_splice_actor+0x1fd/0x580 [ 479.230518][T13588] ? kmsan_get_metadata+0x4f/0x180 [ 479.235622][T13588] splice_direct_to_actor+0x6b2/0xf50 [ 479.240980][T13588] ? do_splice_direct+0x580/0x580 [ 479.246006][T13588] do_splice_direct+0x342/0x580 [ 479.250855][T13588] do_sendfile+0x101b/0x1d40 [ 479.255451][T13588] __se_compat_sys_sendfile+0x301/0x3c0 [ 479.260985][T13588] ? kmsan_get_metadata+0x11d/0x180 [ 479.266169][T13588] ? __ia32_sys_sendfile64+0x70/0x70 [ 479.271439][T13588] __ia32_compat_sys_sendfile+0x56/0x70 [ 479.276972][T13588] __do_fast_syscall_32+0x2aa/0x400 [ 479.282164][T13588] do_fast_syscall_32+0x6b/0xd0 [ 479.287004][T13588] do_SYSENTER_32+0x73/0x90 [ 479.291496][T13588] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 479.297805][T13588] RIP: 0023:0xf7f8a549 [ 479.301852][T13588] Code: Bad RIP value. [ 479.305902][T13588] RSP: 002b:00000000f5d850cc EFLAGS: 00000296 ORIG_RAX: 00000000000000bb [ 479.314319][T13588] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000004 [ 479.322277][T13588] RDX: 0000000000000000 RSI: 0000000000008000 RDI: 0000000000000000 [ 479.330248][T13588] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 479.338206][T13588] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 479.346161][T13588] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 479.355507][T13588] Kernel Offset: 0xbc00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 479.367030][T13588] Rebooting in 86400 seconds..