fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB], 0x5, 0x2) 03:49:54 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="10000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xffffff97, 0x0) 03:49:54 executing program 0: mkdir(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:55 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r4, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r5 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:49:55 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000"], 0x5, 0x2) 03:49:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08020000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:55 executing program 0: mkdir(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xf, &(0x7f0000000000)=0x80, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000140)=0xfffffffffffffffb, 0x4) openat$zero(0xffffffffffffff9c, 0x0, 0x4000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000000c0)={0xffffffff80000001, 0x3, 0x3ff}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) getrusage(0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fremovexattr(r1, &(0x7f00000001c0)=@known='system.sockprotoname\x00') recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) fstatfs(0xffffffffffffffff, 0x0) getpgrp(0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:49:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xfffffff5, 0x0) 03:49:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:49:55 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000"], 0x5, 0x2) 03:49:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08040000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xfffffff6, 0x0) 03:49:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:49:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08060000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:56 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r4, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r5 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:49:56 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000"], 0x5, 0x2) 03:49:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xf, &(0x7f0000000000)=0x80, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000140)=0xfffffffffffffffb, 0x4) openat$zero(0xffffffffffffff9c, 0x0, 0x4000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000000c0)={0xffffffff80000001, 0x3, 0x3ff}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) getrusage(0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fremovexattr(r1, &(0x7f00000001c0)=@known='system.sockprotoname\x00') recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) fstatfs(0xffffffffffffffff, 0x0) getpgrp(0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:49:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:49:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xfffffffd, 0x0) 03:49:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="080c0000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x1000000000, 0x0) 03:49:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:49:56 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200"], 0x5, 0x2) 03:49:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08100000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xf, &(0x7f0000000000)=0x80, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000140)=0xfffffffffffffffb, 0x4) openat$zero(0xffffffffffffff9c, 0x0, 0x4000, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000000c0)={0xffffffff80000001, 0x3, 0x3ff}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) getrusage(0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fremovexattr(r1, &(0x7f00000001c0)=@known='system.sockprotoname\x00') recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) fstatfs(0xffffffffffffffff, 0x0) getpgrp(0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:49:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:49:57 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r5 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:49:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08120000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:57 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200"], 0x5, 0x2) 03:49:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="c51e00e870413d28eea0829705b4126e51276c76ac6680aba3776784b69cbe14c23c63578c00000018568bb174ee5b371afaef9f0f3cc4354738f8e43e4a82fedde537bd25edc075a012b2da9701855258bf1836b5d07c4ed6008f9aa013480fa3557971ce8e1640fb4557d84bcda07e3a05ffbcd775587dc0d2a60015423ad420e08a3fda2066ce60f92c337836b725c0069c0602bea03689b72ded9379b2ea8fad72e3aa8450838a086c15cb5e48c9fdfda8795ce2e6cfa5344dc5a07e400957ff16bb52dd96d7384e0336fdb85df2cd27ec56adbf77c6803e292fec8003363522e0eb34ef58e0b12e9f3e86ed0ed08453f4"], 0xfffffc29) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000100)) 03:49:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:49:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xedc000000000, 0x0) 03:49:57 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200"], 0x5, 0x2) 03:49:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x1000000000000, 0x0) 03:49:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000600e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x2) 03:49:57 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000000"], 0x5, 0x2) 03:49:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000c00e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1657.609005][ T1222] bridge0: port 1(bridge_slave_0) entered disabled state [ 1657.678928][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1657.719330][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1657.726481][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 03:49:58 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r5 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:49:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x100000000000000, 0x0) 03:49:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x2) 03:49:58 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000000"], 0x5, 0x2) 03:49:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08001200e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x400000006}, 0x1c) 03:49:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x200000000000000, 0x0) 03:49:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\n', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port'}}) 03:49:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x2) 03:49:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08002000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:58 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000000"], 0x5, 0x2) 03:49:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0], 0x4, 0x2) [ 1658.486254][ T1288] 9pnet: p9_fd_create_tcp (1288): problem connecting socket to 127.0.0.1 [ 1658.486254][ T1288] [ 1658.509066][ T1276] bridge0: port 1(bridge_slave_0) entered disabled state [ 1658.614750][ T1282] bridge0: port 1(bridge_slave_0) entered blocking state [ 1658.621957][ T1282] bridge0: port 1(bridge_slave_0) entered forwarding state 03:49:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x300000000000000, 0x0) 03:49:59 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000"], 0x5, 0x2) 03:49:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08003f00e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0], 0x4, 0x2) 03:49:59 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r5 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:49:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) bind$bt_hci(r0, &(0x7f0000000040), 0x32) 03:49:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08004000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:49:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0], 0x4, 0x2) 03:49:59 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000"], 0x5, 0x2) 03:49:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:49:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB], 0x5, 0x2) 03:49:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x400000000000000, 0x0) 03:49:59 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000"], 0x5, 0x2) 03:49:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="0800ff00e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1659.585603][ T1421] bridge0: port 1(bridge_slave_0) entered disabled state [ 1659.800274][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1659.809596][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1659.816715][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:00 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r5 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB], 0x5, 0x2) 03:50:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="080fff00e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x500000000000000, 0x0) 03:50:00 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000200e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB], 0x5, 0x2) 03:50:00 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000"], 0x5, 0x2) 03:50:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x600000000000000, 0x0) [ 1660.454105][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1660.506411][ T1485] bridge0: port 1(bridge_slave_0) entered blocking state [ 1660.513570][ T1485] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:01 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r5 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000400e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:01 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000"], 0x5, 0x2) 03:50:01 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x700000000000000, 0x0) 03:50:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000600e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:01 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:01 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000"], 0x5, 0x2) 03:50:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x800000000000000, 0x0) 03:50:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:01 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) [ 1661.399447][ T1533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1661.470078][T31656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1661.479040][T31656] bridge0: port 1(bridge_slave_0) entered blocking state [ 1661.486169][T31656] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:02 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6(0xa, 0x2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200"], 0x5, 0x2) 03:50:02 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000c00e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x900000000000000, 0x0) 03:50:02 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200"], 0x5, 0x2) 03:50:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08001000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x1000000000000000, 0x0) 03:50:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200"], 0x5, 0x2) [ 1662.324270][ T1580] bridge0: port 1(bridge_slave_0) entered disabled state [ 1662.387721][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 1662.394848][ T1583] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:03 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:03 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08001200e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000000"], 0x5, 0x2) 03:50:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x1f00000000000000, 0x0) 03:50:03 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000000"], 0x5, 0x2) 03:50:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000006e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000000"], 0x5, 0x2) 03:50:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x2000000000000000, 0x0) [ 1663.364059][ T1628] bridge0: port 1(bridge_slave_0) entered disabled state [ 1663.400567][ T2157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1663.408937][ T2157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1663.416121][ T2157] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:04 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:04 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd7", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="0800000ce27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000"], 0x5, 0x2) 03:50:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x2010000000000000, 0x0) 03:50:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000"], 0x5, 0x2) 03:50:04 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd7", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x2300000000000000, 0x0) 03:50:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000012e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1664.141663][ C0] net_ratelimit: 10 callbacks suppressed [ 1664.141670][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:50:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000"], 0x5, 0x2) [ 1664.255685][ T1668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1664.363780][ T1676] bridge0: port 1(bridge_slave_0) entered blocking state [ 1664.370896][ T1676] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:04 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:04 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd7", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x240f000000000000, 0x0) 03:50:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000020e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:04 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b6619", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="0800003fe27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x3f00000000000000, 0x0) [ 1665.225682][ T1718] bridge0: port 1(bridge_slave_0) entered disabled state [ 1665.247861][ T1721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1665.254984][ T1721] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:05 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000040e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:05 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b6619", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x4000000000000000, 0x0) 03:50:05 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b6619", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="080000ffe27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x4800000000000000, 0x0) 03:50:06 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1666.177233][ T1779] bridge0: port 1(bridge_slave_0) entered disabled state [ 1666.237520][ T2157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1666.246291][ T2157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1666.253422][ T2157] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:06 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000fffe27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x4c00000000000000, 0x0) 03:50:06 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:06 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000002e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:07 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x4d5f53665248425f, 0x0) [ 1667.173017][ T1930] bridge0: port 1(bridge_slave_0) entered disabled state [ 1667.186658][ T1933] bridge0: port 1(bridge_slave_0) entered blocking state [ 1667.193875][ T1933] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:07 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000004e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:07 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:07 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x5f42485266535f4d, 0x0) 03:50:07 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000006e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:07 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x6800000000000000, 0x0) 03:50:08 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd7", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1668.133989][ T1973] bridge0: port 1(bridge_slave_0) entered disabled state [ 1668.169383][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1668.183058][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1668.190167][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:08 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:08 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="0800000ce27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:08 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633a", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:08 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd7", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x6c00000000000000, 0x0) 03:50:08 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd7", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:08 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633a", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:08 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000010e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b6619", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x7400000000000000, 0x0) [ 1669.094070][ T2022] bridge0: port 1(bridge_slave_0) entered disabled state [ 1669.128245][ T2027] bridge0: port 1(bridge_slave_0) entered blocking state [ 1669.135392][ T2027] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:09 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:09 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000012e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:09 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633a", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x7a00000000000000, 0x0) 03:50:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b6619", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:09 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b6619", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:09 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d0ff85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x8000000000000000, 0x0) 03:50:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1669.901684][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.907500][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1669.913347][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.919113][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1669.924951][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.930706][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1670.077043][ T2076] bridge0: port 1(bridge_slave_0) entered disabled state [ 1670.115245][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1670.123807][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 1670.130883][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:10 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:10 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:10 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:10 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d10f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x8cffffff00000000, 0x0) 03:50:10 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:10 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09075e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:10 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x97ffffff00000000, 0x0) 03:50:11 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab029b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1671.027847][ T2144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1671.114383][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1671.130210][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 1671.137391][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:11 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:11 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:11 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:11 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab049b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xf5ffffff00000000, 0x0) 03:50:11 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:11 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab089b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:11 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xf6ffffff00000000, 0x0) 03:50:12 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab109b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1671.955047][ T2263] bridge0: port 1(bridge_slave_0) entered disabled state [ 1672.022189][ T2294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1672.029328][ T2294] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:12 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:12 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:12 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xf9fdffff00000000, 0x0) 03:50:12 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab589b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:12 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:12 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce6103e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:12 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633a", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, 0x0, 0x0) 03:50:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xfcfdffff00000000, 0x0) 03:50:12 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633a", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1672.978534][ T2407] bridge0: port 1(bridge_slave_0) entered disabled state [ 1672.987850][ T9233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1673.016529][ T9233] bridge0: port 1(bridge_slave_0) entered blocking state [ 1673.023850][ T9233] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:13 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:13 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0f60f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:13 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:13 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633a", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, 0x0, 0x0) 03:50:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xfdfdffff00000000, 0x0) 03:50:13 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xfdffffff00000000, 0x0) 03:50:13 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b1060f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:13 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, 0x0, 0x0) 03:50:13 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1673.835156][ T2457] bridge0: port 1(bridge_slave_0) entered disabled state [ 1673.978070][ T2464] bridge0: port 1(bridge_slave_0) entered blocking state [ 1673.986628][ T2464] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:14 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:14 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xff00000000000000, 0x0) 03:50:14 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e0cb42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100), 0x0) 03:50:14 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:14 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:14 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e10b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:14 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100), 0x0) 03:50:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xff0f000000000000, 0x0) 03:50:14 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) [ 1674.835821][ T2498] bridge0: port 1(bridge_slave_0) entered disabled state [ 1674.899243][ T2508] bridge0: port 1(bridge_slave_0) entered blocking state [ 1674.906354][ T2508] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:15 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:15 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e11b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100), 0x0) 03:50:15 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xffefffff00000000, 0x0) 03:50:15 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:15 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e13b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:15 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) 03:50:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xffffffff00000000, 0x0) 03:50:15 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1675.721732][ T2545] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:15 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e14b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:15 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:15 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) 03:50:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0xffffffffffffffff, 0x0) [ 1675.801212][ T2157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1675.819735][ T2157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.826889][ T2157] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:16 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:16 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e17b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:16 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:16 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x3, 0x2) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000002c0)={0x2, 0x0, [{0x1, 0x71, &(0x7f0000000240)=""/113}, {0x6000, 0x34, &(0x7f00000001c0)=""/52}]}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000040)={0x0, 0xfffffffffffff9d3}, &(0x7f0000000080)=0x8) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) fanotify_mark(r1, 0x55, 0x0, r1, &(0x7f00000000c0)='./file0\x00') 03:50:16 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{0x0}], 0x1) 03:50:16 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e19b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1676.144013][ T2582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1676.242291][ T2589] bridge0: port 1(bridge_slave_0) entered blocking state [ 1676.249417][ T2589] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:16 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:16 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:16 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:16 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1871e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x21, 0x29, &(0x7f0000000580)="b9ff0300130d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb", &(0x7f00000000c0)=""/41, 0x1000000fc}, 0x28) 03:50:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2002, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000080)={r1, 0x22}) 03:50:16 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1870e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:16 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:16 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1676.541694][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1676.547518][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:50:16 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:16 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:16 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50f1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1676.621672][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1676.627701][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1676.646151][ T2629] bridge0: port 1(bridge_slave_0) entered disabled state [ 1676.811395][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1676.823713][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1676.830817][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:17 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) 03:50:17 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000180)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000010000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:17 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x4, 0x2) 03:50:17 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed5101fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:17 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159}, {&(0x7f00000013c0)=""/4096}], 0x400, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) 03:50:17 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f0fa872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:17 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1677.111792][ T2679] bridge0: port 1(bridge_slave_0) entered disabled state [ 1677.130716][ T2682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1677.137861][ T2682] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000040)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000003740)='/dev/autofs\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000037c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000039c0)={&(0x7f0000003780), 0xc, &(0x7f0000003980)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c0100003fd10000000000000000", @ANYRES16=r1, @ANYBLOB="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"], 0x14c}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="111c8778c5be24064be4e6ec1a0832f227") 03:50:17 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f10a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:17 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'caif0\x00'}, 0x18) 03:50:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x80000000, 0x0, &(0x7f0000000200), 0x100000, 0x0) 03:50:17 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="02000000000000002080020000000000"], 0x1c, 0x2) 03:50:17 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400000000000000200000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="18000000000000002080020000000000"], 0x1c, 0x2) 03:50:17 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1677.627013][ T2821] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:17 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400000000000000200000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1677.727010][ T2824] bridge0: port 1(bridge_slave_0) entered blocking state [ 1677.734143][ T2824] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:17 executing program 4: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="8da4363ac0ed0000000000e50000004d0100000000593ce90000000000000000000000fff6f2a6299748aeb8ec47e8af16c8ebbc00015a43476fd82f1b49c8a8104884b5e78aaf83280680b88245eabff35d7a", 0x33, 0x10000}], 0x0, 0x0) 03:50:17 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000180020000000000"], 0x1c, 0x2) [ 1677.806170][ T2832] IPVS: Error connecting to the multicast addr [ 1677.826547][ T2828] IPVS: Error connecting to the multicast addr 03:50:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv6_newroute={0x1c, 0x18, 0x311}, 0x1c}}, 0x0) 03:50:17 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400000000000000200000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:17 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:18 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') membarrier(0x21, 0x0) 03:50:18 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000280020000000000"], 0x1c, 0x2) 03:50:18 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x0) 03:50:18 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:18 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1678.229205][ T2867] bridge0: port 1(bridge_slave_0) entered disabled state [ 1678.311671][ T2876] bridge0: port 1(bridge_slave_0) entered blocking state [ 1678.318856][ T2876] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:18 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000480020000000000"], 0x1c, 0x2) 03:50:18 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x0) 03:50:18 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2200, 0x0) r1 = dup(0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000040)={r1, 0x4, 0x9, "980c5925c138ca2c7087d220519eb8d25a2f318d2a45303c12f2350c78055e6fc83a11b573b4b2a9361ca31251ecae4d50a770b81442a7aa2003432e5b649b21bac9467f059058fe1e5e475d462d349ab74a69f0765deaf580215aeaeafe6753b86103003d1fc79e6aaa5e42e709747a9ee6d7f69cc14ec885521fa3ff2cb7bca6485d199a4febf8343ea6fc22f8e21a41361c4b4d3a95ffa470245220293c5840b74e890865df61"}) 03:50:18 executing program 1: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="f9ffffffffffffff00", @ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYRESHEX], 0x0, 0x50}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:50:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 03:50:18 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000880020000000000"], 0x1c, 0x2) 03:50:18 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x0) 03:50:18 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1678.469451][ T2912] ptrace attach of "/root/syz-executor.1"[2911] was attempted by "/root/syz-executor.1"[2912] 03:50:18 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000001080020000000000"], 0x1c, 0x2) 03:50:18 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1678.717712][ T2920] bridge0: port 1(bridge_slave_0) entered disabled state [ 1678.802841][ T2929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1678.809976][ T2929] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10004}], 0x0, 0x0) 03:50:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180), 0x132472) clone(0x2102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) fcntl$setstatus(r1, 0x4, 0x42803) 03:50:18 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:18 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10020000000000002080020000000000"], 0x1c, 0x2) 03:50:19 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10040000000000002080020000000000"], 0x1c, 0x2) [ 1679.181821][ T2961] bridge0: port 1(bridge_slave_0) entered disabled state [ 1679.225430][ T2964] bridge0: port 1(bridge_slave_0) entered blocking state [ 1679.232586][ T2964] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') membarrier(0x21, 0x0) 03:50:19 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000000000000400000000000000200000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) 03:50:19 executing program 4: r0 = syz_open_dev$audion(&(0x7f00000007c0)='/dev/audio#\x00', 0x401, 0x800) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000840)={0x760e, 0x5, 0x9, 0x10000, 0x11, 0x1f, 0x3, 0x0, 0x5e, 0x8001}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000800)=0x3, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x208448, &(0x7f0000000140)=ANY=[@ANYBLOB='index=on,index=off,workdir=./file0,nfs_export=on,default_permissions,workdir=./file0,workdir=./file0/file0,xino=auto,xino=auto,euid>', @ANYRESDEC=r1, @ANYBLOB="2c66756e633d65524544535f430145434b2c00"]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x400000, 0x0) sendmmsg$sock(r2, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="2b837500f38aef23500cacede80cb460a3466eec7d3b9d1a86ceab3c23", 0x1d}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f00000003c0)="355dba4b1c09388aa92234fa7636e1a566a1", 0x12}, {&(0x7f0000000400)="d962690e54110488d84b952481c72e68c8880a060a8a3791d0595444925d2dd425b468890d249c59101e737755fcc176863036f78491a8bd48677f42e3d996b596baa957036b31294511be105fed84e4c4bf42e41d92c3c92fbcd6b587d967b3f0e2b33b0e2152f088baab1a7a8c30f8bc0005457e00be6c06bcba07c463528d792fbca7ccc118d2d47cc57b13b0830f17feb29e19d5cd735ace19365479d68ed397f58a68", 0xa5}, {&(0x7f00000004c0)="d60365b5268ff3c0e511066c0da23e15814f564587f1e2faa06eb17767c0961e4040e6c2028354088d1b86de328b9beaa65c0e42f7215989295938e81516b4fc15324836a728d668a9ee0e3f2ec9b93a07112ae8bdf039173b5d41920f9a77ef21bc", 0x62}, {&(0x7f0000000540)="3b19370e21bae53a591070b42c8c978bf412f50a84a7557591b40b4b646ee8b215150bb287ac0a41e19abfb8eaae811a93cad93351f7708cd04444ad3da13b82eeff1b93891e3ada74fc217ad36d416467b47915a7ee5dd7f24e7565698fba8ee3f27488602b025c202fefa7c11c01b426d8b6e8d987f68593543c0b3a45913c18e25e3f80cbe5a61aca962acb69c3404346f536cceea035caa5fcc7ec559bd4e52dcdf1297190d2502eba8a4ff5196a4f7e9f42963b1226816e9795fc17d3c6909437e27bf13ff8", 0xc8}], 0x6, &(0x7f00000006c0)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffffa}}, @timestamping={{0x14, 0x1, 0x25, 0xfff}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x259}}, @txtime={{0x18, 0x1, 0x3d, 0xdd9}}], 0xa8}}], 0x1, 0x0) write$P9_RREADDIR(r2, &(0x7f0000001900)={0x109, 0x29, 0x1, {0x401, [{{0xe, 0x1, 0x2}, 0x200, 0x5, 0x7, './file0'}, {{0x1a, 0x3}, 0x6, 0x1000, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfffffffffffffff7, 0x7f, 0x7, './file0'}, {{0x8, 0x0, 0x2}, 0x7, 0x1f, 0xd, './file0/file0'}, {{0x8, 0x3, 0x3}, 0x3, 0x1, 0x7, './file0'}, {{0xe0, 0x0, 0x3}, 0x1, 0xeb, 0x7, './file0'}, {{0x0, 0x2, 0x1}, 0x7, 0x6, 0x7, './file0'}, {{0x2, 0x3}, 0xc8cd, 0x5, 0x7, './file0'}]}}, 0x109) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x0, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0xfffffffffffffd51, 0x10000}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000880)={0x0, 0x493, 0x30, 0xf, 0x401}, &(0x7f0000001a40)=0x18) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001a80)={r3, 0x100000000, 0x82, 0x400}, &(0x7f0000001ac0)=0x10) 03:50:19 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10060000000000002080020000000000"], 0x1c, 0x2) 03:50:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000000240)) 03:50:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:19 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100c0000000000002080020000000000"], 0x1c, 0x2) 03:50:19 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000000000000400000000000000200000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1679.600835][ T2995] overlayfs: unrecognized mount option "euid>18446744073709551615" or missing value 03:50:19 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10100000000000002080020000000000"], 0x1c, 0x2) 03:50:19 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x3) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000080)=0xb5) 03:50:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') membarrier(0x21, 0x0) 03:50:19 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000000000000400000000000000200000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x2) [ 1679.762796][ T2983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1679.818264][ T2991] bridge0: port 1(bridge_slave_0) entered blocking state [ 1679.825512][ T2991] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:19 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10120000000000002080020000000000"], 0x1c, 0x2) 03:50:20 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x0) 03:50:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d17000000000000000000000000000000fff6f2a200020000b81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100), 0x0) [ 1680.084732][ T3003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1680.162462][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1680.169555][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1680.241708][ T3037] bridge0: port 1(bridge_slave_0) entered disabled state [ 1680.279142][ T3043] bridge0: port 1(bridge_slave_0) entered blocking state 03:50:20 executing program 3: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:20 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000600000000002080020000000000"], 0x1c, 0x2) 03:50:20 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x0) [ 1680.286281][ T3043] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:20 executing program 1: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x4, 0x0, 0x0, 0x0, 0x0) gettid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r2 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="8da4363ac0ed0000000000000000004d010000000000000000000000000000bbf3313d466141610000000000000efd9a000001b3da2694f2e59d1bca227c26853361d93aa03dd4058980380b6f7b62872f38bef2cc735485f20dc9f72feca60aa7da00000000", 0x66, 0x10000}], 0x0, 0x0) seccomp(0x0, 0x1, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0x0, 0xffffffff, 0x3, 0x7}, {0x10000, 0x7, 0x1, 0x8000}, {0xfffffffffffffffc, 0x5, 0x2, 0x4}, {0x20, 0x90, 0x2, 0x7f}, {0x2be, 0x43, 0xfffffffffffffffd, 0xe2}, {0xffffffff, 0x6, 0xff}, {0x2, 0x2, 0x40a, 0x20}, {0x1ff, 0x1, 0x8000, 0x3}, {0x4, 0x6, 0x4, 0x34e}, {0x5, 0x800, 0x2800000000000, 0x6}]}) 03:50:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:20 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000c00000000002080020000000000"], 0x1c, 0x2) 03:50:20 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x5, 0x0) 03:50:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1680.525613][ T3068] bridge0: port 1(bridge_slave_0) entered disabled state [ 1680.538048][ T3077] bridge0: port 1(bridge_slave_0) entered blocking state [ 1680.545187][ T3077] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:20 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10001200000000002080020000000000"], 0x1c, 0x2) 03:50:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x81}], 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x400000, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000000c0)) accept$packet(r0, 0x0, &(0x7f0000000100)) write$FUSE_STATFS(r0, &(0x7f0000000180)={0x60, 0x0, 0x7, {{0x3, 0x1, 0x8, 0x88, 0x1, 0x5, 0x6cc, 0xffffffffffff7635}}}, 0x60) 03:50:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1680.701668][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1680.707455][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1680.779910][ T3078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1680.781661][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1680.792870][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1680.931796][ T3079] bridge0: port 1(bridge_slave_0) entered disabled state [ 1681.027727][ T3091] bridge0: port 1(bridge_slave_0) entered disabled state [ 1681.075512][ T3090] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.082639][ T3090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1681.092174][ T3089] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.099259][ T3089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1681.140924][ T3233] bridge0: port 1(bridge_slave_0) entered disabled state [ 1681.150925][ T3235] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.158076][ T3235] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:21 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10002000000000002080020000000000"], 0x1c, 0x2) 03:50:21 executing program 4: getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) r2 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffffd, 0xc000) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000480)=0x6) mount$9p_virtio(&(0x7f00000000c0)='eth0trustedppp0\xf90em0\\vmnet0}\'\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2082450, &(0x7f0000000340)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x7}}, {@afid={'afid'}}], [{@fowner_lt={'fowner<', r0}}, {@euid_gt={'euid>', r1}}, {@subj_type={'subj_type', 0x3d, 'btrfs\x00'}}, {@fsmagic={'fsmagic'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fsname={'fsname', 0x3d, 'eth0}+vboxnet1&'}}, {@appraise_type='appraise_type=imasig'}]}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10003}], 0x0, 0x0) r3 = socket(0x10, 0x7, 0x40) connect$pptp(r3, &(0x7f0000000080)={0x18, 0x2, {0x0, @rand_addr=0x1}}, 0x1e) 03:50:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:21 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10003f00000000002080020000000000"], 0x1c, 0x2) [ 1681.448445][ T3257] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:21 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x31, 0x14200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21}, @in={0x2, 0x4e24, @loopback}], 0x30) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:21 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10004000000000002080020000000000"], 0x1c, 0x2) 03:50:21 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000ff00000000002080020000000000"], 0x1c, 0x2) [ 1681.664040][ T3260] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1681.722140][ T3271] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.729228][ T3271] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1681.827769][ T3270] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.834910][ T3270] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:21 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100fff00000000002080020000000000"], 0x1c, 0x2) 03:50:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x800000000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/91, 0x5b}], 0x1) 03:50:22 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000020000000002080020000000000"], 0x1c, 0x2) 03:50:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:22 executing program 4: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x1, 0x80) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000000c0)=[0xee00, 0xee00, 0xee00, 0xee01, 0xffffffffffffffff, 0xee01, 0xee00, 0xffffffffffffffff]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x80, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x9bd09c4e434ccb2}}, {@max_read={'max_read', 0x3d, 0x9}}], [{@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}]}}) 03:50:22 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000010000002080020000000000"], 0x1c, 0x2) [ 1682.214899][ T3540] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1682.272970][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1682.281479][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 1682.288594][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:22 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000020000002080020000000000"], 0x1c, 0x2) [ 1682.468969][ T3673] fuse: Bad value for 'subtype' 03:50:22 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x802) fcntl$addseals(r0, 0x409, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8000, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000040)) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000180)={0x4, 0x0, [{0x54, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x1}, {0x597, 0x0, 0x9}, {0xfff, 0x0, 0x8000}]}) 03:50:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x600000000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:22 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:22 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000040000002080020000000000"], 0x1c, 0x2) [ 1682.692181][ T3674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1682.729629][ T3687] bridge0: port 1(bridge_slave_0) entered blocking state 03:50:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1682.736771][ T3687] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:22 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:22 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000060000002080020000000000"], 0x1c, 0x2) 03:50:22 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x10400, 0x40) r2 = dup(r1) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0x100, 0x4) [ 1682.895903][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1682.932479][ T22] bridge0: port 1(bridge_slave_0) entered blocking state 03:50:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r3 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:23 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) [ 1682.939612][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x400000000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:23 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000c0000002080020000000000"], 0x1c, 0x2) 03:50:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) [ 1683.272916][ T3828] bridge0: port 1(bridge_slave_0) entered disabled state [ 1683.408747][T15560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1683.423983][T15560] bridge0: port 1(bridge_slave_0) entered blocking state [ 1683.431093][T15560] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x600000000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:23 executing program 4: r0 = socket$caif_stream(0x25, 0x1, 0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000840)='/dev/zero\x00', 0x100, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000800)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000600", @ANYRES32=r6, @ANYBLOB="04000100000000eb0700010045800ed50fd68660135e537a5581e97150ea019aaf00b58d03dcbb8d163c485f05b07ed64292925ad5569d0766c76ae76adc7b1ce53dba41de344e693d94eec29846eef288bfd8f894048584bbf3237a35a669754b5e0ce51c523b3f7d6cc5ff1a6178d32196c52195e628c920de27c4d869ec295608076d2902475ec24f2a04b9c7ff6f1b7c0c9ec936b309", @ANYRES32=r7, @ANYBLOB="10000500000000002000020000000000"], 0x54, 0x1) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:23 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000100000002080020000000000"], 0x1c, 0x2) 03:50:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x400000000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:23 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000120000002080020000000000"], 0x1c, 0x2) 03:50:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) [ 1683.672833][ T3963] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:23 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 03:50:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x400000000000000) fcntl$setpipe(r1, 0x407, 0x1000000) [ 1683.746219][ T3968] bridge0: port 1(bridge_slave_0) entered blocking state [ 1683.753352][ T3968] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1684.091651][ T4148] bridge0: port 1(bridge_slave_0) entered disabled state [ 1684.112010][ T4202] bridge0: port 1(bridge_slave_0) entered blocking state [ 1684.119164][ T4202] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x440000, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000040)={0xff, 0x5, 0x5}) 03:50:24 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000003f0000002080020000000000"], 0x1c, 0x2) 03:50:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x8001}], 0x0, 0x0) 03:50:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:24 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000400000002080020000000000"], 0x1c, 0x2) 03:50:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) [ 1684.431723][ T4210] bridge0: port 1(bridge_slave_0) entered disabled state [ 1684.471696][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1684.477483][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1684.483323][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1684.489078][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1684.494908][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1684.500660][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:50:24 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10ffffff8c0000002080020000000000"], 0x1c, 0x2) 03:50:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) [ 1684.611661][ T4212] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1684.804787][ T4221] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x800800000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x80000001, 0x7, 0x0, 0x401}) 03:50:25 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:25 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10fffffff60000002080020000000000"], 0x1c, 0x2) 03:50:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1684.898831][ T4325] bridge0: port 1(bridge_slave_0) entered blocking state [ 1684.905967][ T4325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1684.916339][ T2157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1684.925353][ T2157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1684.932474][ T2157] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:25 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10fffffffe0000002080020000000000"], 0x1c, 0x2) 03:50:25 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1685.083119][ T4366] bridge0: port 1(bridge_slave_0) entered blocking state [ 1685.090222][ T4366] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:25 executing program 4: arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:25 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x10000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:25 executing program 1 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:25 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000ff0000002080020000000000"], 0x1c, 0x2) 03:50:25 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:50:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000980)='./file0\x00', 0x0, 0x9, &(0x7f0000001040)=[{&(0x7f00000009c0)="f117a5a647ad1fc83b083c1d9c2dfbc6c8c86ecf81aa23cd8f6fe1a5b5d46ae457898822e67ff8ba45e4bf08000000000000002b87cd745d", 0x38, 0x2}, {&(0x7f0000000a00)="1e4b16522a8787501ec24ae2f00c0223bd1e534679c53636f90918bf04463ea6ba3f78f324287ac1cedad92bcedebb1bf39e1f68c449fb97954a04fbe2d51a323a45f59fa73b433e59fc9d4d711d3ebea180762d43e20bc2c3c34096851f0334c9949de0d11b8dbb3ee4bcf3acbfbf51312c5b49543e061aeb9eaabc82d326e7f365efbc5edac08f9ef70a9afd0b069ae6e5f6b6a06a55099a15712ae0a738fc46acb444375c030736bef28f8f8576be8b73c9cc4fa959f8e8330aa48e296a15b490ff5f80924ae753b7c330eb5ad46786e062b27d095f2093235d74046dee6f6ec5128b4b3791ad785908f157ca853ca81d87f1f7", 0xf5, 0x1}, {&(0x7f0000000b00)="5caba22617087393f1bac6dc48421dc23b34811f", 0x14, 0x8}, {&(0x7f0000000b40)="809748b6a06aaf6bd85803a0723bec16824557c13e894da7c12b074054ed2fb441ad996d45a4e5383f890abc5fee5d5b51b801e32397cf8c7d8e90049b07871ae77152fc956aa95e66067d332892cb92238e7e937e70404d55278251f2f523072942d5c39e5647c1105edbb34aac37f7c4b5e71b9766dfe4cd00671cd8f7b310c7f70f0c5eed6505a2c1350b3f3d7e3456b28aec6dca25c3b9bb2174576b6e0178f44d1f2024f9bfd04b20b4c182b8c989f11bf0af9837e525c551f08d7ccece76e4d44aef274564523ab756eb1493c9c3f63a9645c83a232a8866d60814ca7be7465ff14154981c2b04898fceafbe", 0xef, 0x4}, {&(0x7f0000000c40)="ade38384c3755cb344cb17168e9434431bb1ba108966a870c1aeb8bb9f85d33c98ab3ea1207270f3e50fe112b53866f35eb78b19b490633a6d276e869258f59437d8f73f2983e7e6bbd1b930f7ee1a4e87c5aac8a5e22f228fd838a9bb35eda26dcc1c845ac3aceec9018c2da73d98c4aee60794a075761a6fe4d5031b01927d1163b5ae7e447893a7ce8d0ebae3fe6d80111f13f507c4143af269c4945d7d7b2c23a62337634f224840f719f221718cce5a8d4d58014672f82a3f5cb041cbdfe34af0fca669080089d2b4289cd77283bf1fd98bb50e4e673d", 0xd9, 0x1}, {&(0x7f0000000d40)="4b38316df655699c63d9686577ec00366ad73dab0d6418d1b2a638ef81c6ca56a79fcd55df7709b78bece7398e4744c398148422f5effd2b1fcfdabf808f1782379a733be4b2cfe242dc191389412b071903b4acbda78493873a1ba78f31789a5fa9a1a5883eaeab80d325a6b4a0375df000b3bc75a2ac981afb4dba2a4fd0a6376bcacef6be12106f815f5c9f9c0d46252025ccff98054c47e4efe5c7e56c70120fd5f563a5ceb1926e7161a578b650ecbf6bdd32d6eef9878ef2dd7acdf9fda0af18900e4b2e2163bbc029c726da932a245660f61ab56ccf76ad7091b2d9", 0xdf}, {&(0x7f0000001140)="7a226c15204f9813a1f4a9ccb0f0163ff74d889b44343e52688d1f40a78d06027705547b7a4d5dadffd1a1814370ab758ac04feec5d52f9db0baf28b4c94167c6590c600c558137a869ba2c8538fd8984093a8a6dc97d2c62d6989ea04129fc4bd7410f419c9e6c5f4", 0x65, 0x101}, {&(0x7f00000011c0)="d87d725edcc465559080d9bcc188226cd9e72c5cfb284ea49ee9396f5546e0678815d4427f6284bae2b3750f70ba6ec3afa99081fd45008ab6c0d1723eb86dcbcc0e06339937484be8469395c0e4a8e65efd1c56d9259cf78ac69f392fd1cc3d3824c667f6dc50ad90164353c3eea8a8297e7d0d2c0192a4c6469248b39e2467cb1ff1aecb35f2f71784e8024ebf1b419a76", 0x92, 0x3}, {&(0x7f0000000f80)="22851565674d4f268816b2cda97656a327102983be0e845c427e42a1be6387a015486ba140f4e0c9e9d8f7c88ad1a6f4d8e49392f4b681da410f3761fdf73d074b8d92070fa7a5ed76419138f7c5779848325c8f626af5bb447e4f1a92e606f43ef95379dc2129e2fe6362c415a53fa3ef5ce7b4ba13de6b41e2e94bddfad02dcd2ce721d95ad41212d7ad23c67ff6436c3e18e75efd6c536f4f638ac3261ccf66d66bfe6ee68d928968101015c838252afcb6240d9aafa7", 0xb8, 0x8001}], 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x80900, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000440)={0x400, 0x23d, &(0x7f0000000300)="b4148dcb8622752dda81112a716cd8fd917fe1c19b03ef36ecbc6042c2132a45a63c73f292284d62b5b078426083ee8f0a2183d4043b210984ed2e7df8f4f3e21adb667b32620c4747db4b881c829e0b540968e8bafd6be12071401f18e9f014e5eb7bf60b6ac612d1ae49f14c04330865eb8cee853966d36470e23d5395effc5880f14d12be3d5a97b4dd8d680066e870d5299edc", &(0x7f00000003c0)="09e922f435dc5dc8eb56a7e44fdf1d9985e4f9c197a6ae2463efad13de050a796784996fcfdc4c912ae6f6d2ceb3144650b0cb6eb28ac52e323e37ab401fff4ca24161cb0c196adf0f41dc6623862ae1f2f3", 0x95, 0x52}) select(0x40, &(0x7f0000000180)={0x5, 0x9, 0x7, 0x9, 0x3, 0x7fffffff, 0x9a61, 0x5}, &(0x7f00000001c0)={0x7, 0xffffffff, 0x1, 0x20, 0x80000001, 0x4, 0x7f, 0x100000001}, &(0x7f0000000200)={0x7, 0x28000000, 0x800000000, 0x9, 0x3, 0x40, 0x8, 0x8}, &(0x7f0000000280)={r0, r1/1000+30000}) r3 = fcntl$getown(0xffffffffffffffff, 0x9) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) r5 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x101000) ptrace$setregs(0xd, r3, 0x5, &(0x7f0000000000)="f589c6afffd374e186b7fadfaab4250c9b367f5631b419ad4ea4163621f236415c1db55b6333958339727cdb37a82f71784ae3f7c01582f7c8f999b666cc5e4bdb723ace57c4f787d8d5e9d43d9ece4af04aca8b128a") write$binfmt_script(r5, &(0x7f0000000900)={'#! ', './file0', [{0x20, 'keyring'}, {0x20, 'fscontext'}], 0xa, "75886215bf63d6a672e75335b63c19f810f6887f445698e79838624152a6c8e07246bec6c8459f3c9b7fc45138e15eab"}, 0x4d) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000100)=""/6) r6 = geteuid() r7 = request_key(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x0}, &(0x7f0000000ec0)='/dev/hwrng\x00', 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001280)='keyring\x00', &(0x7f00000012c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r7, &(0x7f0000000f00)='blacklist\x00', &(0x7f0000000f40)={'syz', 0x3}, r8) getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000780)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000480)='hfsplus\x00', &(0x7f00000004c0)='./file0\x00', 0xfff, 0x2, &(0x7f0000000580)=[{&(0x7f0000000500)="cd01ebdc629b3220ed6b68f2aaa5c47bafa1b314a92993426789ea9a44538709a7719bd7631772735b226cc74f524172f349c3dc67100354", 0x38, 0x200}, {&(0x7f0000000540)="2f676fb78dbe60aa592f9c235393254973f3788f3f0fd4e43e834efd572f7ca2b611c16368f84629f35687bf5ed63546821ef572514c0f5d", 0x38, 0x3}], 0x40, &(0x7f00000007c0)={[{@nls={'nls', 0x3d, 'default'}}, {@nls={'nls', 0x3d, 'euc-jp'}}, {@creator={'creator', 0x3d, "59846d16"}}, {@nodecompose='nodecompose'}, {@nobarrier='nobarrier'}, {@uid={'uid', 0x3d, r6}}], [{@fowner_lt={'fowner<', r9}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_eq={'fowner', 0x3d, r10}}, {@fsname={'fsname', 0x3d, '/dev/hwrng\x00'}}, {@obj_role={'obj_role', 0x3d, '/dev/dri/card#\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f00000008c0), 0x4) 03:50:25 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x10000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:25 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000fff0000002080020000000000"], 0x1c, 0x2) 03:50:25 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:50:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1685.679703][ T4524] hfsplus: unable to change nls mapping 03:50:25 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="108cffffff0000002080020000000000"], 0x1c, 0x2) [ 1685.720122][ T4569] FAULT_INJECTION: forcing a failure. [ 1685.720122][ T4569] name failslab, interval 1, probability 0, space 0, times 0 [ 1685.740418][ T4524] hfsplus: unable to parse mount options [ 1685.776105][ T4569] CPU: 1 PID: 4569 Comm: syz-executor.1 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1685.785161][ T4569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1685.795224][ T4569] Call Trace: [ 1685.798524][ T4569] dump_stack+0x172/0x1f0 [ 1685.802854][ T4569] should_fail.cold+0xa/0x15 [ 1685.807502][ T4569] ? fault_create_debugfs_attr+0x180/0x180 [ 1685.813316][ T4569] ? page_to_nid.part.0+0x20/0x20 [ 1685.818417][ T4569] ? ___might_sleep+0x163/0x280 [ 1685.823257][ T4569] __should_failslab+0x121/0x190 [ 1685.828172][ T4569] should_failslab+0x9/0x14 [ 1685.832653][ T4569] kmem_cache_alloc+0x2aa/0x710 [ 1685.837494][ T4569] ? __kasan_check_write+0x14/0x20 [ 1685.842589][ T4569] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1685.848113][ T4569] getname_flags+0xd6/0x5b0 [ 1685.852595][ T4569] user_path_at_empty+0x2f/0x50 [ 1685.857454][ T4569] path_setxattr+0xae/0x1b0 [ 1685.861941][ T4569] ? setxattr+0x380/0x380 [ 1685.866247][ T4569] ? __ia32_sys_read+0xb0/0xb0 [ 1685.870987][ T4569] ? switch_fpu_return+0x1fa/0x4f0 [ 1685.876105][ T4569] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1685.882158][ T4569] __x64_sys_lsetxattr+0xc1/0x150 [ 1685.887183][ T4569] do_syscall_64+0xfa/0x760 [ 1685.891683][ T4569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1685.897569][ T4569] RIP: 0033:0x459829 [ 1685.901461][ T4569] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:50:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x10000000000) fcntl$setpipe(r1, 0x407, 0x1000000) 03:50:26 executing program 1 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1685.921054][ T4569] RSP: 002b:00007fecae184c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 1685.929442][ T4569] RAX: ffffffffffffffda RBX: 00007fecae184c90 RCX: 0000000000459829 [ 1685.937395][ T4569] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1685.945344][ T4569] RBP: 000000000075bf20 R08: 0000000000000002 R09: 0000000000000000 [ 1685.953304][ T4569] R10: 000000000000001c R11: 0000000000000246 R12: 00007fecae1856d4 [ 1685.961289][ T4569] R13: 00000000004c5c64 R14: 00000000004da488 R15: 0000000000000003 03:50:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:50:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1686.112033][ T4524] hfsplus: unable to change nls mapping [ 1686.136759][ T4652] FAULT_INJECTION: forcing a failure. [ 1686.136759][ T4652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1686.149978][ T4652] CPU: 1 PID: 4652 Comm: syz-executor.1 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1686.158988][ T4652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1686.169033][ T4652] Call Trace: [ 1686.172333][ T4652] dump_stack+0x172/0x1f0 [ 1686.176651][ T4652] should_fail.cold+0xa/0x15 [ 1686.181231][ T4652] ? fault_create_debugfs_attr+0x180/0x180 [ 1686.187029][ T4652] should_fail_alloc_page+0x50/0x60 [ 1686.192219][ T4652] __alloc_pages_nodemask+0x1a1/0x900 [ 1686.197578][ T4652] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1686.203283][ T4652] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1686.210381][ T4652] ? __kasan_check_read+0x11/0x20 [ 1686.215398][ T4652] ? fault_create_debugfs_attr+0x180/0x180 [ 1686.221188][ T4652] cache_grow_begin+0x90/0xd20 [ 1686.225941][ T4652] ? getname_flags+0xd6/0x5b0 [ 1686.230598][ T4652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1686.236820][ T4652] kmem_cache_alloc+0x64e/0x710 [ 1686.241660][ T4652] getname_flags+0xd6/0x5b0 [ 1686.246148][ T4652] user_path_at_empty+0x2f/0x50 [ 1686.251003][ T4652] path_setxattr+0xae/0x1b0 [ 1686.255491][ T4652] ? setxattr+0x380/0x380 [ 1686.259799][ T4652] ? __ia32_sys_read+0xb0/0xb0 [ 1686.264543][ T4652] ? switch_fpu_return+0x1fa/0x4f0 [ 1686.269636][ T4652] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1686.275706][ T4652] __x64_sys_lsetxattr+0xc1/0x150 [ 1686.280714][ T4652] do_syscall_64+0xfa/0x760 [ 1686.285200][ T4652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1686.291072][ T4652] RIP: 0033:0x459829 [ 1686.294985][ T4652] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1686.314569][ T4652] RSP: 002b:00007fecae184c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 1686.322959][ T4652] RAX: ffffffffffffffda RBX: 00007fecae184c90 RCX: 0000000000459829 [ 1686.330912][ T4652] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1686.338864][ T4652] RBP: 000000000075bf20 R08: 0000000000000002 R09: 0000000000000000 [ 1686.346814][ T4652] R10: 000000000000001c R11: 0000000000000246 R12: 00007fecae1856d4 [ 1686.354764][ T4652] R13: 00000000004c5c64 R14: 00000000004da488 R15: 0000000000000003 03:50:26 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10f6ffffff0000002080020000000000"], 0x1c, 0x2) [ 1686.370944][ T4524] hfsplus: unable to parse mount options 03:50:26 executing program 1 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x88000, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) sendto$ax25(r0, &(0x7f0000000240)="3b217a4da79684fb813113ba0dc6d9a4d9eb6e434939489c87aff390ff79bca1821f05479bccff55f1e176a55c4bc110c4e746c0e75f085c3e7a62cc31161186fb97ed5c79624364876a20d4d86bea28aa6121be97fb17b028f1a61230072229b72db007d379762fbce2f681ac534fd60580862616894c2d9fa0732c1a43fe54da1ad0e22958b4d95fb152174dd69fd5d5f65ee5da9bc16e58450462e4a04bde8ce81bf3245343736433366c34f836ec5c875f8ae102524173917ba2ef5f15c89325635eaad212cc43396a6042df35a1c7993b7290c747ba8771510485fee0987a318a795962c731a71a", 0xea, 0x10, &(0x7f0000000040)={{0x3, @null, 0x3}, [@null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) 03:50:26 executing program 3 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:26 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10feffffff0000002080020000000000"], 0x1c, 0x2) 03:50:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1686.563193][ T4765] FAULT_INJECTION: forcing a failure. [ 1686.563193][ T4765] name failslab, interval 1, probability 0, space 0, times 0 [ 1686.583745][ T4765] CPU: 0 PID: 4765 Comm: syz-executor.1 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1686.592795][ T4765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1686.602846][ T4765] Call Trace: [ 1686.606143][ T4765] dump_stack+0x172/0x1f0 [ 1686.610480][ T4765] should_fail.cold+0xa/0x15 [ 1686.615077][ T4765] ? fault_create_debugfs_attr+0x180/0x180 [ 1686.620886][ T4765] ? page_to_nid.part.0+0x20/0x20 [ 1686.625926][ T4765] ? ___might_sleep+0x163/0x280 [ 1686.630779][ T4765] __should_failslab+0x121/0x190 [ 1686.635718][ T4765] should_failslab+0x9/0x14 [ 1686.640231][ T4765] kmem_cache_alloc_node_trace+0x274/0x750 [ 1686.646036][ T4765] ? check_stack_object+0x114/0x160 [ 1686.651245][ T4765] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1686.657129][ T4765] __kmalloc_node+0x3d/0x70 [ 1686.661620][ T4765] kvmalloc_node+0x68/0x100 [ 1686.666121][ T4765] setxattr+0x16f/0x380 [ 1686.670281][ T4765] ? vfs_setxattr+0x100/0x100 [ 1686.674974][ T4765] ? mark_held_locks+0xf0/0xf0 [ 1686.674989][ T4765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1686.675001][ T4765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1686.675014][ T4765] ? __phys_addr_symbol+0x30/0x70 [ 1686.675026][ T4765] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1686.675039][ T4765] ? lock_acquire+0x190/0x410 [ 1686.675058][ T4765] ? mnt_want_write+0x3f/0xc0 [ 1686.686016][ T4765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1686.686031][ T4765] ? __this_cpu_preempt_check+0x3a/0x210 [ 1686.686045][ T4765] ? preempt_count_add+0x7a/0x160 [ 1686.686058][ T4765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1686.686075][ T4765] ? __mnt_want_write+0x1f1/0x2f0 [ 1686.740362][ T4765] path_setxattr+0x197/0x1b0 [ 1686.745041][ T4765] ? setxattr+0x380/0x380 [ 1686.745060][ T4765] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1686.745073][ T4765] __x64_sys_lsetxattr+0xc1/0x150 03:50:26 executing program 1 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1686.745089][ T4765] do_syscall_64+0xfa/0x760 [ 1686.745102][ T4765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1686.745112][ T4765] RIP: 0033:0x459829 [ 1686.745124][ T4765] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1686.745130][ T4765] RSP: 002b:00007fecae184c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 1686.755496][ T4765] RAX: ffffffffffffffda RBX: 00007fecae184c90 RCX: 0000000000459829 [ 1686.755503][ T4765] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000080 [ 1686.755510][ T4765] RBP: 000000000075bf20 R08: 0000000000000002 R09: 0000000000000000 [ 1686.755517][ T4765] R10: 000000000000001c R11: 0000000000000246 R12: 00007fecae1856d4 [ 1686.755525][ T4765] R13: 00000000004c5c64 R14: 00000000004da488 R15: 0000000000000003 [ 1686.867168][ T4879] FAULT_INJECTION: forcing a failure. [ 1686.867168][ T4879] name failslab, interval 1, probability 0, space 0, times 0 [ 1686.905510][ T4879] CPU: 1 PID: 4879 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 03:50:27 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x10800, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0)=0x27, 0x4) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000780)={&(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x1}}, 0x10, &(0x7f0000000680), 0xf4f, &(0x7f00000006c0)="5b03b0e8af7a2be33cad7079937341dfae30afab375bcfdaa97d8c7ec73c11709fea80d68f8ce0ef0b52b5d859533baba070f592e1cb162b835d337f556d21aed42304fe15f574f62027d644b2579a808209f9a0e66feca76045ceb25c823a810894290b1cf10a47ac050f2f845dbcc11e73deed8da4c8ee05dd714a167afb5e794acd42451109f1a7f4fa8d502691007a3d91", 0x93}, 0x40) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000007c0)) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000380)={0x80, 0x8, [0x3, 0x2, 0x400, 0x4, 0x7], 0xc1}) getxattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)=@known='security.apparmor\x00', &(0x7f0000000880)=""/19, 0x13) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x7227, 0x6}, {0x3, 0x82c8}], r1}, 0x18, 0x2) [ 1686.914565][ T4879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1686.924626][ T4879] Call Trace: [ 1686.927930][ T4879] dump_stack+0x172/0x1f0 [ 1686.932273][ T4879] should_fail.cold+0xa/0x15 [ 1686.936876][ T4879] ? fault_create_debugfs_attr+0x180/0x180 [ 1686.942690][ T4879] ? page_to_nid.part.0+0x20/0x20 [ 1686.947730][ T4879] ? ___might_sleep+0x163/0x280 [ 1686.952586][ T4879] __should_failslab+0x121/0x190 [ 1686.957511][ T4879] should_failslab+0x9/0x14 [ 1686.962002][ T4879] kmem_cache_alloc+0x2aa/0x710 [ 1686.966860][ T4879] ? __kasan_check_write+0x14/0x20 [ 1686.975632][ T4879] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1686.981160][ T4879] getname_flags+0xd6/0x5b0 [ 1686.985645][ T4879] getname+0x1a/0x20 [ 1686.989536][ T4879] do_sys_open+0x2c9/0x5d0 [ 1686.993936][ T4879] ? filp_open+0x80/0x80 [ 1686.998337][ T4879] ? __ia32_sys_read+0xb0/0xb0 [ 1687.003091][ T4879] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1687.009142][ T4879] __x64_sys_openat+0x9d/0x100 [ 1687.013888][ T4879] do_syscall_64+0xfa/0x760 [ 1687.018375][ T4879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1687.024258][ T4879] RIP: 0033:0x459829 [ 1687.028149][ T4879] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1687.047835][ T4879] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1687.056233][ T4879] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 03:50:27 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000003f80020000000000"], 0x1c, 0x2) [ 1687.064187][ T4879] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1687.072149][ T4879] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1687.080111][ T4879] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1687.088062][ T4879] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 03:50:27 executing program 0 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:27 executing program 3 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:27 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:27 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:27 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000005880020000000000"], 0x1c, 0x2) 03:50:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x40000) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0x66) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8002, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$RTC_PIE_OFF(r0, 0x7006) [ 1687.336122][ T4902] FAULT_INJECTION: forcing a failure. [ 1687.336122][ T4902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1687.349357][ T4902] CPU: 1 PID: 4902 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1687.358375][ T4902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1687.368429][ T4902] Call Trace: [ 1687.371739][ T4902] dump_stack+0x172/0x1f0 [ 1687.376082][ T4902] should_fail.cold+0xa/0x15 [ 1687.380679][ T4902] ? fault_create_debugfs_attr+0x180/0x180 [ 1687.386491][ T4902] ? perf_trace_lock+0xeb/0x4c0 [ 1687.391354][ T4902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1687.397598][ T4902] ? debug_smp_processor_id+0x3c/0x214 [ 1687.403066][ T4902] should_fail_alloc_page+0x50/0x60 [ 1687.408266][ T4902] __alloc_pages_nodemask+0x1a1/0x900 [ 1687.413901][ T4902] ? __lockdep_free_key_range+0x120/0x120 [ 1687.419710][ T4902] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1687.425433][ T4902] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1687.431067][ T4902] ? __kasan_check_read+0x11/0x20 [ 1687.436098][ T4902] ? fault_create_debugfs_attr+0x180/0x180 [ 1687.441910][ T4902] cache_grow_begin+0x90/0xd20 [ 1687.446680][ T4902] ? getname_flags+0xd6/0x5b0 [ 1687.451362][ T4902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1687.457604][ T4902] kmem_cache_alloc+0x64e/0x710 [ 1687.462456][ T4902] ? __kasan_check_write+0x14/0x20 [ 1687.467748][ T4902] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1687.475027][ T4902] getname_flags+0xd6/0x5b0 [ 1687.479512][ T4902] getname+0x1a/0x20 [ 1687.483389][ T4902] do_sys_open+0x2c9/0x5d0 [ 1687.487786][ T4902] ? filp_open+0x80/0x80 [ 1687.492019][ T4902] ? __ia32_sys_read+0xb0/0xb0 [ 1687.496771][ T4902] ? switch_fpu_return+0x1fa/0x4f0 [ 1687.501871][ T4902] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1687.507924][ T4902] __x64_sys_openat+0x9d/0x100 [ 1687.512682][ T4902] do_syscall_64+0xfa/0x760 [ 1687.517182][ T4902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1687.523052][ T4902] RIP: 0033:0x459829 [ 1687.526927][ T4902] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1687.546513][ T4902] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1687.554903][ T4902] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1687.562855][ T4902] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1687.570804][ T4902] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1687.578763][ T4902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1687.586726][ T4902] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 03:50:27 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system/posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x0, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:27 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='tystem.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:27 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000200000000002080020000000000"], 0x1c, 0x2) 03:50:27 executing program 3 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:27 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_de.ault\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:27 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='uystem.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1687.883144][ T4937] FAULT_INJECTION: forcing a failure. [ 1687.883144][ T4937] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.901792][ T4937] CPU: 1 PID: 4937 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1687.910833][ T4937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1687.920887][ T4937] Call Trace: [ 1687.924191][ T4937] dump_stack+0x172/0x1f0 [ 1687.928524][ T4937] should_fail.cold+0xa/0x15 [ 1687.933133][ T4937] ? fault_create_debugfs_attr+0x180/0x180 [ 1687.938946][ T4937] ? page_to_nid.part.0+0x20/0x20 [ 1687.943973][ T4937] ? ___might_sleep+0x163/0x280 [ 1687.948828][ T4937] __should_failslab+0x121/0x190 [ 1687.953760][ T4937] should_failslab+0x9/0x14 [ 1687.954807][ T4930] bridge0: port 1(bridge_slave_0) entered disabled state [ 1687.958254][ T4937] kmem_cache_alloc+0x2aa/0x710 [ 1687.958271][ T4937] ? memcg_kmem_put_cache+0x3e/0x50 [ 1687.958292][ T4937] ? kmem_cache_alloc+0x314/0x710 [ 1687.980324][ T4937] security_file_alloc+0x39/0x170 [ 1687.985369][ T4937] __alloc_file+0xde/0x340 [ 1687.989778][ T4937] alloc_empty_file+0x72/0x170 [ 1687.994540][ T4937] path_openat+0xef/0x4630 [ 1687.998953][ T4937] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1688.004764][ T4937] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1688.010574][ T4937] ? perf_trace_run_bpf_submit+0x138/0x190 [ 1688.016386][ T4937] ? perf_trace_lock+0x315/0x4c0 [ 1688.021335][ T4937] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1688.026727][ T4937] ? __lockdep_free_key_range+0x120/0x120 03:50:28 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000400000000002080020000000000"], 0x1c, 0x2) [ 1688.032454][ T4937] ? __lockdep_free_key_range+0x120/0x120 [ 1688.038181][ T4937] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1688.043825][ T4937] do_filp_open+0x1a1/0x280 [ 1688.048338][ T4937] ? may_open_dev+0x100/0x100 [ 1688.053020][ T4937] ? lock_downgrade+0x920/0x920 [ 1688.057870][ T4937] ? rwlock_bug.part.0+0x90/0x90 [ 1688.061657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1688.062813][ T4937] ? __kasan_check_read+0x11/0x20 [ 1688.068537][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1688.073500][ T4937] ? do_raw_spin_unlock+0x57/0x270 [ 1688.073524][ T4937] do_sys_open+0x3fe/0x5d0 [ 1688.073546][ T4937] ? filp_open+0x80/0x80 [ 1688.092956][ T4937] ? __ia32_sys_read+0xb0/0xb0 [ 1688.097723][ T4937] ? switch_fpu_return+0x1fa/0x4f0 [ 1688.102844][ T4937] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1688.108918][ T4937] __x64_sys_openat+0x9d/0x100 [ 1688.113692][ T4937] do_syscall_64+0xfa/0x760 [ 1688.118202][ T4937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1688.124092][ T4937] RIP: 0033:0x459829 03:50:28 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_de/ault\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1688.127986][ T4937] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1688.147588][ T4937] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1688.156011][ T4937] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1688.163985][ T4937] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1688.171968][ T4937] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:50:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) writev(r0, &(0x7f0000000040), 0x0) [ 1688.179930][ T4937] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1688.187882][ T4937] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 [ 1688.201218][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1688.223864][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1688.230987][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x0, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:28 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='syttem.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:28 executing program 3 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:28 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000600000000002080020000000000"], 0x1c, 0x2) 03:50:28 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x02', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed8ad200000000000000fff6f2a2299708e8fc4890b81e1b00920e685bec060100"/55, 0x37, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x800) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000180)={0x10, 0x2, &(0x7f0000000100)="6c60f73c66c21d459fc63d9b5b61ddffd1c76b98a55a11b7240f095dcfdf", {0x9f, 0x8, 0x714d5d57, 0x1, 0x1000, 0x8, 0x0, 0x8001}}) 03:50:28 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='syutem.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:28 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000c00000000002080020000000000"], 0x1c, 0x2) 03:50:28 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x06', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1688.553490][ T4982] FAULT_INJECTION: forcing a failure. [ 1688.553490][ T4982] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.598792][ T4982] CPU: 1 PID: 4982 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1688.607855][ T4982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.617934][ T4982] Call Trace: [ 1688.617962][ T4982] dump_stack+0x172/0x1f0 [ 1688.625558][ T4982] should_fail.cold+0xa/0x15 [ 1688.630165][ T4982] ? fault_create_debugfs_attr+0x180/0x180 [ 1688.635978][ T4982] ? page_to_nid.part.0+0x20/0x20 [ 1688.640998][ T4982] ? ___might_sleep+0x163/0x280 [ 1688.644858][ T4967] bridge0: port 1(bridge_slave_0) entered disabled state [ 1688.645849][ T4982] __should_failslab+0x121/0x190 [ 1688.645866][ T4982] should_failslab+0x9/0x14 [ 1688.645877][ T4982] kmem_cache_alloc+0x2aa/0x710 [ 1688.645896][ T4982] ? memcg_kmem_put_cache+0x3e/0x50 [ 1688.672397][ T4982] ? kmem_cache_alloc+0x314/0x710 [ 1688.677419][ T4982] security_file_alloc+0x39/0x170 [ 1688.682444][ T4982] __alloc_file+0xde/0x340 [ 1688.686863][ T4982] alloc_empty_file+0x72/0x170 [ 1688.691625][ T4982] path_openat+0xef/0x4630 [ 1688.696058][ T4982] ? save_stack+0x23/0x90 [ 1688.700385][ T4982] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1688.706210][ T4982] ? kasan_slab_alloc+0xf/0x20 [ 1688.711016][ T4982] ? kmem_cache_alloc+0x121/0x710 [ 1688.716026][ T4982] ? getname_flags+0xd6/0x5b0 [ 1688.720687][ T4982] ? getname+0x1a/0x20 [ 1688.724758][ T4982] ? do_sys_open+0x2c9/0x5d0 [ 1688.729356][ T4982] ? __x64_sys_openat+0x9d/0x100 [ 1688.734291][ T4982] ? do_syscall_64+0xfa/0x760 [ 1688.738957][ T4982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1688.745027][ T4982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.751259][ T4982] ? debug_smp_processor_id+0x3c/0x214 [ 1688.756714][ T4982] ? perf_trace_lock+0xeb/0x4c0 [ 1688.761557][ T4982] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1688.766919][ T4982] ? __lockdep_free_key_range+0x120/0x120 [ 1688.772618][ T4982] ? cache_grow_end+0xa4/0x190 [ 1688.777369][ T4982] ? __kasan_check_read+0x11/0x20 [ 1688.782400][ T4982] do_filp_open+0x1a1/0x280 [ 1688.786896][ T4982] ? may_open_dev+0x100/0x100 [ 1688.791557][ T4982] ? lock_downgrade+0x920/0x920 [ 1688.796406][ T4982] ? rwlock_bug.part.0+0x90/0x90 [ 1688.801335][ T4982] ? __kasan_check_read+0x11/0x20 [ 1688.806350][ T4982] ? do_raw_spin_unlock+0x57/0x270 [ 1688.811460][ T4982] do_sys_open+0x3fe/0x5d0 [ 1688.815875][ T4982] ? filp_open+0x80/0x80 [ 1688.820103][ T4982] ? __ia32_sys_read+0xb0/0xb0 [ 1688.824857][ T4982] ? switch_fpu_return+0x1fa/0x4f0 [ 1688.829972][ T4982] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1688.836024][ T4982] __x64_sys_openat+0x9d/0x100 [ 1688.840785][ T4982] do_syscall_64+0xfa/0x760 [ 1688.845271][ T4982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1688.851143][ T4982] RIP: 0033:0x459829 [ 1688.855014][ T4982] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1688.874614][ T4982] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1688.883019][ T4982] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1688.890982][ T4982] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1688.898931][ T4982] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1688.906912][ T4982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1688.914868][ T4982] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 [ 1688.923058][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1688.928841][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1688.938012][ T4979] bridge0: port 1(bridge_slave_0) entered blocking state [ 1688.945140][ T4979] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:29 executing program 3 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:29 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10001000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x0, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:29 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='syssem.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\f', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed000000000000970dbc98b675a6c30fe900000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10001}], 0x0, 0x0) [ 1689.108983][ T5100] FAULT_INJECTION: forcing a failure. [ 1689.108983][ T5100] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.201769][ T5100] CPU: 0 PID: 5100 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1689.210842][ T5100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.220994][ T5100] Call Trace: [ 1689.224311][ T5100] dump_stack+0x172/0x1f0 [ 1689.228674][ T5100] should_fail.cold+0xa/0x15 [ 1689.233298][ T5100] ? fault_create_debugfs_attr+0x180/0x180 [ 1689.239137][ T5100] ? __lockdep_free_key_range+0x120/0x120 [ 1689.244869][ T5100] ? ___might_sleep+0x163/0x280 [ 1689.249743][ T5100] __should_failslab+0x121/0x190 [ 1689.254742][ T5100] should_failslab+0x9/0x14 [ 1689.259247][ T5100] __kmalloc+0x2e0/0x770 [ 1689.263499][ T5100] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1689.269238][ T5100] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1689.274791][ T5100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1689.281068][ T5100] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1689.286975][ T5100] ? tomoyo_path_number_perm+0x520/0x520 [ 1689.292612][ T5100] ? debug_smp_processor_id+0x3c/0x214 [ 1689.298102][ T5100] ? __lockdep_free_key_range+0x120/0x120 [ 1689.303836][ T5100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.310113][ T5100] ? lock_downgrade+0x920/0x920 [ 1689.314981][ T5100] ? rwlock_bug.part.0+0x90/0x90 [ 1689.319935][ T5100] ? lockref_get+0x16/0x60 [ 1689.324377][ T5100] tomoyo_file_open+0xa9/0xd0 [ 1689.329072][ T5100] security_file_open+0x71/0x300 [ 1689.334036][ T5100] do_dentry_open+0x373/0x1250 [ 1689.338810][ T5100] ? match_exception_partial+0x242/0x2d0 [ 1689.344464][ T5100] ? chown_common+0x5c0/0x5c0 [ 1689.349148][ T5100] ? inode_permission+0xb4/0x560 [ 1689.354108][ T5100] vfs_open+0xa0/0xd0 [ 1689.358097][ T5100] path_openat+0x10e9/0x4630 [ 1689.362688][ T5100] ? save_stack+0x23/0x90 [ 1689.367023][ T5100] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1689.372841][ T5100] ? kasan_slab_alloc+0xf/0x20 [ 1689.377622][ T5100] ? kmem_cache_alloc+0x121/0x710 [ 1689.382658][ T5100] ? getname_flags+0xd6/0x5b0 [ 1689.387354][ T5100] ? getname+0x1a/0x20 [ 1689.391454][ T5100] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1689.396841][ T5100] ? cache_grow_end+0xa4/0x190 [ 1689.401628][ T5100] do_filp_open+0x1a1/0x280 [ 1689.406141][ T5100] ? may_open_dev+0x100/0x100 [ 1689.410842][ T5100] ? __kasan_check_read+0x11/0x20 [ 1689.415878][ T5100] ? do_raw_spin_unlock+0x57/0x270 [ 1689.421044][ T5100] do_sys_open+0x3fe/0x5d0 [ 1689.425460][ T5100] ? filp_open+0x80/0x80 [ 1689.429791][ T5100] ? __ia32_sys_read+0xb0/0xb0 [ 1689.434564][ T5100] ? switch_fpu_return+0x1fa/0x4f0 [ 1689.439706][ T5100] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1689.445784][ T5100] __x64_sys_openat+0x9d/0x100 [ 1689.450555][ T5100] do_syscall_64+0xfa/0x760 [ 1689.455071][ T5100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.460999][ T5100] RIP: 0033:0x459829 [ 1689.465105][ T5100] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1689.491825][ T5100] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 03:50:29 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system/posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.potix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.pouix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_dcl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_aefault\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1689.500599][ T5100] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1689.508577][ T5100] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1689.516560][ T5100] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1689.524543][ T5100] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1689.532517][ T5100] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 [ 1689.547759][ T5100] ERROR: Out of memory at tomoyo_realpath_from_path. 03:50:29 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x12', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:29 executing program 3 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:29 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10001200000000002080020000000000"], 0x1c, 0x2) [ 1689.741764][ T5110] bridge0: port 1(bridge_slave_0) entered disabled state [ 1689.760976][ T5243] FAULT_INJECTION: forcing a failure. [ 1689.760976][ T5243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1689.774200][ T5243] CPU: 1 PID: 5243 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1689.783216][ T5243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1689.793364][ T5243] Call Trace: [ 1689.796662][ T5243] dump_stack+0x172/0x1f0 [ 1689.800996][ T5243] should_fail.cold+0xa/0x15 [ 1689.805595][ T5243] ? fault_create_debugfs_attr+0x180/0x180 [ 1689.811415][ T5243] should_fail_alloc_page+0x50/0x60 [ 1689.816617][ T5243] __alloc_pages_nodemask+0x1a1/0x900 [ 1689.821984][ T5243] ? lock_downgrade+0x920/0x920 [ 1689.826839][ T5243] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1689.832553][ T5243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.838787][ T5243] ? perf_trace_lock+0xeb/0x4c0 [ 1689.843649][ T5243] ? fault_create_debugfs_attr+0x180/0x180 [ 1689.849462][ T5243] cache_grow_begin+0x90/0xd20 [ 1689.854239][ T5243] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1689.859965][ T5243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1689.866208][ T5243] __kmalloc+0x6b2/0x770 [ 1689.870458][ T5243] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1689.876179][ T5243] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1689.881724][ T5243] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1689.887974][ T5243] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1689.893870][ T5243] ? tomoyo_path_number_perm+0x520/0x520 [ 1689.899497][ T5243] ? debug_smp_processor_id+0x3c/0x214 [ 1689.904964][ T5243] ? __lockdep_free_key_range+0x120/0x120 [ 1689.910686][ T5243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.916939][ T5243] ? lock_downgrade+0x920/0x920 [ 1689.921799][ T5243] ? rwlock_bug.part.0+0x90/0x90 [ 1689.926739][ T5243] ? lockref_get+0x16/0x60 [ 1689.931169][ T5243] tomoyo_file_open+0xa9/0xd0 [ 1689.935849][ T5243] security_file_open+0x71/0x300 [ 1689.940821][ T5243] do_dentry_open+0x373/0x1250 [ 1689.945584][ T5243] ? match_exception_partial+0x242/0x2d0 [ 1689.951229][ T5243] ? chown_common+0x5c0/0x5c0 [ 1689.955905][ T5243] ? inode_permission+0xb4/0x560 [ 1689.960847][ T5243] vfs_open+0xa0/0xd0 [ 1689.964832][ T5243] path_openat+0x10e9/0x4630 [ 1689.969413][ T5243] ? save_stack+0x23/0x90 [ 1689.973736][ T5243] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1689.979539][ T5243] ? kasan_slab_alloc+0xf/0x20 [ 1689.984290][ T5243] ? kmem_cache_alloc+0x121/0x710 [ 1689.989299][ T5243] ? getname_flags+0xd6/0x5b0 [ 1689.993965][ T5243] ? getname+0x1a/0x20 [ 1689.998029][ T5243] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1690.003377][ T5243] ? cache_grow_end+0xa4/0x190 [ 1690.008131][ T5243] do_filp_open+0x1a1/0x280 [ 1690.012625][ T5243] ? may_open_dev+0x100/0x100 [ 1690.017294][ T5243] ? __kasan_check_read+0x11/0x20 [ 1690.022294][ T5243] ? do_raw_spin_unlock+0x57/0x270 [ 1690.027391][ T5243] do_sys_open+0x3fe/0x5d0 [ 1690.031799][ T5243] ? filp_open+0x80/0x80 [ 1690.036031][ T5243] ? __ia32_sys_read+0xb0/0xb0 [ 1690.041510][ T5243] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1690.047571][ T5243] __x64_sys_openat+0x9d/0x100 [ 1690.052339][ T5243] do_syscall_64+0xfa/0x760 [ 1690.056836][ T5243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1690.062705][ T5243] RIP: 0033:0x459829 [ 1690.066578][ T5243] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1690.086164][ T5243] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1690.094556][ T5243] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1690.102521][ T5243] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1690.110471][ T5243] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1690.118437][ T5243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1690.126386][ T5243] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 [ 1690.135936][ T5120] bridge0: port 1(bridge_slave_0) entered blocking state [ 1690.143057][ T5120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1690.150506][ C0] net_ratelimit: 4 callbacks suppressed [ 1690.150514][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1690.161885][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:50:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:30 executing program 4: prctl$PR_GET_NO_NEW_PRIVS(0x27) 03:50:30 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_de.ault\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:30 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xf0', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:30 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000006000000002080020000000000"], 0x1c, 0x2) 03:50:30 executing program 3 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:30 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3, 0x0) getpeername$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000000c0)=0x6e) getpeername$unix(r0, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', 'mime_type\'\x00'}, &(0x7f0000000240)=""/239, 0xef) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/21, 0x15}, {&(0x7f0000000440)=""/52, 0x34}], 0x2) 03:50:30 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_de/ault\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:30 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:30 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000c000000002080020000000000"], 0x1c, 0x2) [ 1690.379596][ T5268] FAULT_INJECTION: forcing a failure. [ 1690.379596][ T5268] name failslab, interval 1, probability 0, space 0, times 0 [ 1690.406323][ T5268] CPU: 1 PID: 5268 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1690.415367][ T5268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1690.425423][ T5268] Call Trace: [ 1690.428708][ T5268] dump_stack+0x172/0x1f0 [ 1690.433044][ T5268] should_fail.cold+0xa/0x15 [ 1690.437647][ T5268] ? fault_create_debugfs_attr+0x180/0x180 [ 1690.443460][ T5268] ? ___might_sleep+0x163/0x280 [ 1690.448315][ T5268] __should_failslab+0x121/0x190 [ 1690.453255][ T5268] should_failslab+0x9/0x14 [ 1690.457758][ T5268] __kmalloc+0x2e0/0x770 [ 1690.461997][ T5268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1690.468402][ T5268] ? d_absolute_path+0x11b/0x170 [ 1690.473333][ T5268] ? __d_path+0x140/0x140 [ 1690.477656][ T5268] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1690.483033][ T5268] tomoyo_encode2.part.0+0xf5/0x400 [ 1690.488232][ T5268] tomoyo_encode+0x2b/0x50 [ 1690.492651][ T5268] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1690.498285][ T5268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1690.504529][ T5268] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1690.510417][ T5268] ? tomoyo_path_number_perm+0x520/0x520 [ 1690.514758][ T5265] bridge0: port 1(bridge_slave_0) entered disabled state [ 1690.516043][ T5268] ? debug_smp_processor_id+0x3c/0x214 [ 1690.516067][ T5268] ? __lockdep_free_key_range+0x120/0x120 [ 1690.534204][ T5268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1690.540454][ T5268] ? lock_downgrade+0x920/0x920 [ 1690.545300][ T5268] ? rwlock_bug.part.0+0x90/0x90 [ 1690.550231][ T5268] ? lockref_get+0x16/0x60 [ 1690.554646][ T5268] tomoyo_file_open+0xa9/0xd0 [ 1690.559315][ T5268] security_file_open+0x71/0x300 [ 1690.559334][ T5268] do_dentry_open+0x373/0x1250 [ 1690.559353][ T5268] ? match_exception_partial+0x242/0x2d0 [ 1690.569020][ T5268] ? chown_common+0x5c0/0x5c0 [ 1690.579282][ T5268] ? inode_permission+0xb4/0x560 [ 1690.584223][ T5268] vfs_open+0xa0/0xd0 [ 1690.588209][ T5268] path_openat+0x10e9/0x4630 [ 1690.592803][ T5268] ? save_stack+0x23/0x90 [ 1690.597133][ T5268] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1690.602933][ T5268] ? kasan_slab_alloc+0xf/0x20 [ 1690.607691][ T5268] ? kmem_cache_alloc+0x121/0x710 [ 1690.612711][ T5268] ? getname_flags+0xd6/0x5b0 [ 1690.617385][ T5268] ? getname+0x1a/0x20 [ 1690.621456][ T5268] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1690.626829][ T5268] ? cache_grow_end+0xa4/0x190 [ 1690.626853][ T5268] do_filp_open+0x1a1/0x280 [ 1690.636088][ T5268] ? may_open_dev+0x100/0x100 [ 1690.640776][ T5268] ? __kasan_check_read+0x11/0x20 [ 1690.645797][ T5268] ? do_raw_spin_unlock+0x57/0x270 [ 1690.650929][ T5268] do_sys_open+0x3fe/0x5d0 [ 1690.655350][ T5268] ? filp_open+0x80/0x80 [ 1690.659599][ T5268] ? __ia32_sys_read+0xb0/0xb0 [ 1690.664365][ T5268] ? switch_fpu_return+0x1fa/0x4f0 [ 1690.669478][ T5268] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1690.675545][ T5268] __x64_sys_openat+0x9d/0x100 [ 1690.680312][ T5268] do_syscall_64+0xfa/0x760 [ 1690.684825][ T5268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1690.690708][ T5268] RIP: 0033:0x459829 [ 1690.694594][ T5268] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1690.714194][ T5268] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1690.722711][ T5268] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1690.730666][ T5268] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1690.738711][ T5268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1690.746762][ T5268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1690.755153][ T5268] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 [ 1690.765393][ T5268] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1690.769525][ T5269] bridge0: port 1(bridge_slave_0) entered blocking state [ 1690.779196][ T5269] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:30 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000012000000002080020000000000"], 0x1c, 0x2) 03:50:30 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_defdult\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:31 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0xfffffffffffffd27, 0xfffd}], 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x9, 0x0) r1 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000180)='./file0\x00', r1, r2, 0x1c00) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)=""/97) 03:50:31 executing program 3 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:31 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000020000000002080020000000000"], 0x1c, 0x2) 03:50:31 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_defaslt\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:31 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1691.060973][ T5302] FAULT_INJECTION: forcing a failure. [ 1691.060973][ T5302] name failslab, interval 1, probability 0, space 0, times 0 03:50:31 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000003f000000002080020000000000"], 0x1c, 0x2) [ 1691.181658][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1691.187466][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1691.191681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1691.197436][ T5302] CPU: 0 PID: 5302 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1691.198977][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1691.207927][ T5302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1691.207934][ T5302] Call Trace: [ 1691.207959][ T5302] dump_stack+0x172/0x1f0 [ 1691.207989][ T5302] should_fail.cold+0xa/0x15 [ 1691.235921][ T5302] ? fault_create_debugfs_attr+0x180/0x180 [ 1691.241747][ T5302] ? page_to_nid.part.0+0x20/0x20 [ 1691.246783][ T5302] ? ___might_sleep+0x163/0x280 [ 1691.251636][ T5302] __should_failslab+0x121/0x190 [ 1691.251655][ T5302] should_failslab+0x9/0x14 [ 1691.251671][ T5302] kmem_cache_alloc_trace+0x2d3/0x790 [ 1691.266446][ T5302] ? kasan_kmalloc+0x9/0x10 [ 1691.271046][ T5302] ? __kmalloc_node+0x4e/0x70 [ 1691.275743][ T5302] vhost_net_open+0x6f/0x8f0 [ 1691.280346][ T5302] ? vhost_net_release+0x260/0x260 [ 1691.285472][ T5302] misc_open+0x395/0x4c0 [ 1691.289740][ T5302] ? misc_devnode+0x140/0x140 [ 1691.294430][ T5302] chrdev_open+0x245/0x6b0 [ 1691.298864][ T5302] ? cdev_put.part.0+0x50/0x50 [ 1691.303649][ T5302] ? security_file_open+0x87/0x300 [ 1691.308778][ T5302] do_dentry_open+0x4df/0x1250 [ 1691.313547][ T5302] ? match_exception_partial+0x242/0x2d0 [ 1691.319194][ T5302] ? cdev_put.part.0+0x50/0x50 [ 1691.323979][ T5302] ? chown_common+0x5c0/0x5c0 [ 1691.328670][ T5302] ? inode_permission+0xb4/0x560 [ 1691.333718][ T5302] vfs_open+0xa0/0xd0 [ 1691.337720][ T5302] path_openat+0x10e9/0x4630 [ 1691.342331][ T5302] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1691.348163][ T5302] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1691.351713][ T5303] bridge0: port 1(bridge_slave_0) entered disabled state [ 1691.353545][ T5302] ? __lockdep_free_key_range+0x120/0x120 [ 1691.353574][ T5302] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1691.372014][ T5302] do_filp_open+0x1a1/0x280 [ 1691.376543][ T5302] ? may_open_dev+0x100/0x100 [ 1691.381237][ T5302] ? __kasan_check_read+0x11/0x20 [ 1691.381255][ T5302] ? do_raw_spin_unlock+0x57/0x270 [ 1691.391390][ T5302] do_sys_open+0x3fe/0x5d0 [ 1691.395825][ T5302] ? filp_open+0x80/0x80 [ 1691.400088][ T5302] ? __ia32_sys_read+0xb0/0xb0 [ 1691.404862][ T5302] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1691.404892][ T5302] __x64_sys_openat+0x9d/0x100 [ 1691.415698][ T5302] do_syscall_64+0xfa/0x760 [ 1691.420219][ T5302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1691.426119][ T5302] RIP: 0033:0x459829 [ 1691.430019][ T5302] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1691.449635][ T5302] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1691.458050][ T5302] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1691.466023][ T5302] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1691.474000][ T5302] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:50:31 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000040000000002080020000000000"], 0x1c, 0x2) 03:50:31 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_defauls\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1691.481980][ T5302] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1691.489956][ T5302] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 [ 1691.512603][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1691.521115][ T17] bridge0: port 1(bridge_slave_0) entered blocking state 03:50:31 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default&', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1691.528233][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:31 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x02', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:31 executing program 3 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) [ 1691.746128][ T5337] FAULT_INJECTION: forcing a failure. [ 1691.746128][ T5337] name failslab, interval 1, probability 0, space 0, times 0 [ 1691.804364][ T5337] CPU: 0 PID: 5337 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1691.813441][ T5337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1691.823512][ T5337] Call Trace: [ 1691.826817][ T5337] dump_stack+0x172/0x1f0 [ 1691.831168][ T5337] should_fail.cold+0xa/0x15 [ 1691.835769][ T5337] ? fault_create_debugfs_attr+0x180/0x180 [ 1691.841583][ T5337] ? page_to_nid.part.0+0x20/0x20 [ 1691.846614][ T5337] ? ___might_sleep+0x163/0x280 [ 1691.851489][ T5337] __should_failslab+0x121/0x190 [ 1691.856437][ T5337] should_failslab+0x9/0x14 [ 1691.860955][ T5337] kmem_cache_alloc_trace+0x2d3/0x790 [ 1691.866329][ T5337] ? kasan_kmalloc+0x9/0x10 [ 1691.870870][ T5337] ? __kmalloc_node+0x4e/0x70 [ 1691.871725][ T5335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1691.875557][ T5337] vhost_net_open+0x6f/0x8f0 [ 1691.875576][ T5337] ? vhost_net_release+0x260/0x260 [ 1691.892256][ T5337] misc_open+0x395/0x4c0 [ 1691.896596][ T5337] ? misc_devnode+0x140/0x140 [ 1691.901278][ T5337] chrdev_open+0x245/0x6b0 [ 1691.905702][ T5337] ? cdev_put.part.0+0x50/0x50 [ 1691.910483][ T5337] ? security_file_open+0x87/0x300 [ 1691.915607][ T5337] do_dentry_open+0x4df/0x1250 [ 1691.920382][ T5337] ? match_exception_partial+0x242/0x2d0 [ 1691.926027][ T5337] ? cdev_put.part.0+0x50/0x50 [ 1691.930821][ T5337] ? chown_common+0x5c0/0x5c0 [ 1691.935519][ T5337] ? inode_permission+0xb4/0x560 [ 1691.940491][ T5337] vfs_open+0xa0/0xd0 [ 1691.944490][ T5337] path_openat+0x10e9/0x4630 [ 1691.949094][ T5337] ? perf_trace_run_bpf_submit+0x131/0x190 [ 1691.954935][ T5337] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1691.960339][ T5337] ? cache_grow_end+0xa4/0x190 [ 1691.965138][ T5337] do_filp_open+0x1a1/0x280 [ 1691.971004][ T5337] ? may_open_dev+0x100/0x100 [ 1691.976500][ T5337] ? __kasan_check_read+0x11/0x20 [ 1691.981538][ T5337] ? do_raw_spin_unlock+0x57/0x270 [ 1691.986695][ T5337] do_sys_open+0x3fe/0x5d0 [ 1691.991135][ T5337] ? filp_open+0x80/0x80 [ 1691.995378][ T5337] ? __ia32_sys_read+0xb0/0xb0 [ 1691.995393][ T5337] ? switch_fpu_return+0x1fa/0x4f0 [ 1691.995415][ T5337] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1692.011329][ T5337] __x64_sys_openat+0x9d/0x100 [ 1692.016121][ T5337] do_syscall_64+0xfa/0x760 [ 1692.020659][ T5337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.020673][ T5337] RIP: 0033:0x459829 [ 1692.020694][ T5337] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:50:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) splice(r0, &(0x7f0000000040), r1, &(0x7f00000000c0), 0x3dec22f000000000, 0x9) 03:50:32 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000ff000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default$', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1692.051511][ T5337] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1692.059934][ T5337] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1692.067914][ T5337] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1692.075895][ T5337] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1692.083886][ T5337] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 [ 1692.091951][ T5337] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 [ 1692.118857][ T5339] bridge0: port 1(bridge_slave_0) entered blocking state [ 1692.125980][ T5339] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:32 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000fff000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 3 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:32 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1692.282986][ T5365] FAULT_INJECTION: forcing a failure. [ 1692.282986][ T5365] name failslab, interval 1, probability 0, space 0, times 0 03:50:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = semget$private(0x0, 0x1, 0xd8) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/71) [ 1692.384064][ T5365] CPU: 0 PID: 5365 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1692.393136][ T5365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.403205][ T5365] Call Trace: [ 1692.406521][ T5365] dump_stack+0x172/0x1f0 [ 1692.410878][ T5365] should_fail.cold+0xa/0x15 [ 1692.415766][ T5365] ? fault_create_debugfs_attr+0x180/0x180 [ 1692.421598][ T5365] ? page_to_nid.part.0+0x20/0x20 [ 1692.426633][ T5365] ? ___might_sleep+0x163/0x280 [ 1692.431504][ T5365] __should_failslab+0x121/0x190 [ 1692.436463][ T5365] should_failslab+0x9/0x14 [ 1692.440978][ T5365] kmem_cache_alloc_trace+0x2d3/0x790 [ 1692.446351][ T5365] ? kasan_kmalloc+0x9/0x10 [ 1692.446365][ T5365] ? __kmalloc_node+0x4e/0x70 [ 1692.446394][ T5365] vhost_net_open+0x6f/0x8f0 [ 1692.446420][ T5365] ? vhost_net_release+0x260/0x260 [ 1692.455568][ T5365] misc_open+0x395/0x4c0 [ 1692.455590][ T5365] ? misc_devnode+0x140/0x140 [ 1692.455608][ T5365] chrdev_open+0x245/0x6b0 [ 1692.455633][ T5365] ? cdev_put.part.0+0x50/0x50 [ 1692.483360][ T5365] ? security_file_open+0x87/0x300 [ 1692.488482][ T5365] do_dentry_open+0x4df/0x1250 [ 1692.493249][ T5365] ? match_exception_partial+0x242/0x2d0 [ 1692.498982][ T5365] ? cdev_put.part.0+0x50/0x50 [ 1692.503771][ T5365] ? chown_common+0x5c0/0x5c0 [ 1692.508466][ T5365] ? inode_permission+0xb4/0x560 [ 1692.513433][ T5365] vfs_open+0xa0/0xd0 [ 1692.517438][ T5365] path_openat+0x10e9/0x4630 [ 1692.522031][ T5365] ? save_stack+0x23/0x90 [ 1692.526372][ T5365] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1692.532190][ T5365] ? kasan_slab_alloc+0xf/0x20 [ 1692.536951][ T5365] ? kmem_cache_alloc+0x121/0x710 [ 1692.541987][ T5365] ? getname_flags+0xd6/0x5b0 [ 1692.546673][ T5365] ? getname+0x1a/0x20 [ 1692.550775][ T5365] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1692.556163][ T5365] ? cache_grow_end+0xa4/0x190 [ 1692.560947][ T5365] do_filp_open+0x1a1/0x280 [ 1692.565462][ T5365] ? may_open_dev+0x100/0x100 [ 1692.570170][ T5365] ? __kasan_check_read+0x11/0x20 [ 1692.575207][ T5365] ? do_raw_spin_unlock+0x57/0x270 [ 1692.580359][ T5365] do_sys_open+0x3fe/0x5d0 [ 1692.584796][ T5365] ? filp_open+0x80/0x80 [ 1692.589051][ T5365] ? __ia32_sys_read+0xb0/0xb0 [ 1692.593823][ T5365] ? switch_fpu_return+0x1fa/0x4f0 [ 1692.598951][ T5365] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1692.605031][ T5365] __x64_sys_openat+0x9d/0x100 [ 1692.609801][ T5365] do_syscall_64+0xfa/0x760 [ 1692.614318][ T5365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.620216][ T5365] RIP: 0033:0x459829 [ 1692.624121][ T5365] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1692.643742][ T5365] RSP: 002b:00007feb2b476c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1692.652174][ T5365] RAX: ffffffffffffffda RBX: 00007feb2b476c90 RCX: 0000000000459829 [ 1692.660155][ T5365] RDX: 0000000000000002 RSI: 00000000200007c0 RDI: ffffffffffffff9c [ 1692.668131][ T5365] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1692.676108][ T5365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feb2b4776d4 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xff', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xff', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x8c', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000200000002080020000000000"], 0x1c, 0x2) [ 1692.684106][ T5365] R13: 00000000004c663a R14: 00000000004db568 R15: 0000000000000004 03:50:32 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xf6', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 3 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:32 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000100002080020000000000"], 0x1c, 0x2) 03:50:32 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x2a00, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000440)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r1, 0x102, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000380)={@host}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000540)={0x0, @reserved}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x3}, {0x8001, 0x8}], r4}, 0x18, 0x3) [ 1692.844039][ T5377] bridge0: port 1(bridge_slave_0) entered disabled state [ 1692.973009][ T5375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1692.982413][ T5375] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:33 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xff', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000200002080020000000000"], 0x1c, 0x2) [ 1693.031667][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1693.037490][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1693.043333][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:50:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x402) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0xa1d8987af07a7d87) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan1\x00', 0x0}) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@can={0x1d, 0x0}, &(0x7f00000004c0)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @dev}, &(0x7f0000000680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000880)=0x14) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000940)=@req={0x28, &(0x7f0000000900)={'vlan0\x00', @ifru_addrs=@xdp={0x2c, 0x7, 0x0, 0x2d}}}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0}, &(0x7f00000009c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a80)=0x14, 0x80800) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000008540)={@empty, 0x0}, &(0x7f0000008580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000c280)=[{{&(0x7f000000bcc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000be00)=[{&(0x7f000000bd40)=""/147, 0x93}], 0x1}, 0x7}, {{&(0x7f000000be40)=@ax25={{0x3, @netrom}, [@default, @remote, @null, @remote, @remote, @rose, @netrom]}, 0x80, &(0x7f000000c000)=[{&(0x7f000000bec0)=""/51, 0x33}, {&(0x7f000000bf00)=""/32, 0x20}, {&(0x7f000000bf40)=""/165, 0xa5}], 0x3, &(0x7f000000c040)=""/49, 0x31}, 0x4595}, {{&(0x7f000000c080)=@un=@abs, 0x80, &(0x7f000000c180)=[{&(0x7f000000c100)=""/98, 0x62}], 0x1, &(0x7f000000c1c0)=""/156, 0x9c}, 0x9}], 0x3, 0x20, &(0x7f000000c340)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f000000c380)={@rand_addr, 0x0}, &(0x7f000000c3c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c400)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f000000c500)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f000000c540)={@loopback, @broadcast, 0x0}, &(0x7f000000c580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c5c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f000000c6c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f000000c700)=@can={0x1d, 0x0}, &(0x7f000000c780)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000010700)=[{{0x0, 0x0, &(0x7f000000cb40)=[{&(0x7f000000c7c0)=""/217, 0xd9}, {&(0x7f000000c8c0)=""/237, 0xed}, {&(0x7f000000c9c0)=""/153, 0x99}, {&(0x7f000000ca80)=""/83, 0x53}, {&(0x7f000000cb00)=""/51, 0x33}], 0x5, &(0x7f000000cbc0)=""/4096, 0x1000}, 0x6}, {{&(0x7f000000dbc0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f000000dd80)=[{&(0x7f000000dc40)=""/236, 0xec}, {&(0x7f000000dd40)=""/9, 0x9}], 0x2, &(0x7f000000ddc0)=""/144, 0x90}, 0x998a}, {{&(0x7f000000de80)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f000000f380)=[{&(0x7f000000df00)=""/98, 0x62}, {&(0x7f000000df80)=""/116, 0x74}, {&(0x7f000000e000)=""/79, 0x4f}, {&(0x7f000000e080)=""/232, 0xe8}, {&(0x7f000000e180)=""/4096, 0x1000}, {&(0x7f000000f180)=""/223, 0xdf}, {&(0x7f000000f280)=""/227, 0xe3}], 0x7, &(0x7f000000f400)=""/149, 0x95}, 0xffffffff}, {{&(0x7f000000f4c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f000000f880)=[{&(0x7f000000f540)=""/42, 0x2a}, {&(0x7f000000f580)=""/229, 0xe5}, {&(0x7f000000f680)=""/203, 0xcb}, {&(0x7f000000f780)=""/58, 0x3a}, {&(0x7f000000f7c0)=""/112, 0x70}, {&(0x7f000000f840)=""/8, 0x8}], 0x6}, 0xffffffffffff8000}, {{0x0, 0x0, &(0x7f000000fe40)=[{&(0x7f000000f900)=""/148, 0x94}, {&(0x7f000000f9c0)=""/212, 0xd4}, {&(0x7f000000fac0)=""/4, 0x4}, {&(0x7f000000fb00)=""/186, 0xba}, {&(0x7f000000fbc0)=""/145, 0x91}, {&(0x7f000000fc80)=""/234, 0xea}, {&(0x7f000000fd80)=""/145, 0x91}], 0x7, &(0x7f000000fec0)=""/138, 0x8a}, 0xda1}, {{&(0x7f000000ff80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010280)=[{&(0x7f0000010000)=""/79, 0x4f}, {&(0x7f0000010080)=""/143, 0x8f}, {&(0x7f0000010140)}, {&(0x7f0000010180)=""/211, 0xd3}], 0x4, &(0x7f00000102c0)=""/229, 0xe5}, 0x2}, {{&(0x7f00000103c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000105c0)=[{&(0x7f0000010440)=""/245, 0xf5}, {&(0x7f0000010540)=""/79, 0x4f}], 0x2, &(0x7f0000010600)=""/244, 0xf4}, 0x7}], 0x7, 0x10000, &(0x7f00000108c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000010ac0)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000012800)=[{{&(0x7f0000010b00)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000010c40)=[{&(0x7f0000010b80)=""/179, 0xb3}], 0x1, &(0x7f0000010c80)=""/40, 0x28}, 0xd639}, {{0x0, 0x0, &(0x7f0000010dc0)=[{&(0x7f0000010cc0)=""/209, 0xd1}], 0x1}, 0xfffffffffffff825}, {{&(0x7f0000010e00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000010e80), 0x0, &(0x7f0000010ec0)=""/46, 0x2e}, 0x10000}, {{&(0x7f0000010f00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000011040)=[{&(0x7f0000010f80)=""/141, 0x8d}], 0x1, &(0x7f0000011080)=""/124, 0x7c}, 0x10000}, {{&(0x7f0000011100)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000011340)=[{&(0x7f0000011180)=""/151, 0x97}, {&(0x7f0000011240)=""/147, 0x93}, {&(0x7f0000011300)=""/47, 0x2f}], 0x3}, 0x4}, {{&(0x7f0000011380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000012680)=[{&(0x7f0000011400)=""/201, 0xc9}, {&(0x7f0000011500)=""/4, 0x4}, {&(0x7f0000011540)=""/142, 0x8e}, {&(0x7f0000011600)=""/98, 0x62}, {&(0x7f0000011680)=""/4096, 0x1000}], 0x5, &(0x7f0000012700)=""/252, 0xfc}, 0x8e}], 0x6, 0x12001, &(0x7f0000012980)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000012a80)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000012b80)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000016ec0)=[{{&(0x7f0000012bc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000013d80)=[{&(0x7f0000012c40)=""/178, 0xb2}, {&(0x7f0000012d00)=""/128, 0x80}, {&(0x7f0000012d80)=""/4096, 0x1000}], 0x3, &(0x7f0000013dc0)=""/206, 0xce}, 0x10001}, {{&(0x7f0000013ec0)=@x25={0x9, @remote}, 0x80, &(0x7f00000151c0)=[{&(0x7f0000013f40)=""/4096, 0x1000}, {&(0x7f0000014f40)=""/245, 0xf5}, {&(0x7f0000015040)=""/103, 0x67}, {&(0x7f00000150c0)=""/110, 0x6e}, {&(0x7f0000015140)=""/90, 0x5a}], 0x5, &(0x7f0000015240)=""/152, 0x98}, 0xfffffffffffffffe}, {{&(0x7f0000015300)=@alg, 0x80, &(0x7f00000156c0)=[{&(0x7f0000015380)=""/189, 0xbd}, {&(0x7f0000015440)=""/176, 0xb0}, {&(0x7f0000015500)=""/74, 0x4a}, {&(0x7f0000015580)=""/34, 0x22}, {&(0x7f00000155c0)=""/52, 0x34}, {&(0x7f0000015600)=""/44, 0x2c}, {&(0x7f0000015640)=""/71, 0x47}], 0x7, &(0x7f0000015740)=""/63, 0x3f}, 0x80}, {{0x0, 0x0, &(0x7f0000016940)=[{&(0x7f0000015780)=""/19, 0x13}, {&(0x7f00000157c0)=""/4096, 0x1000}, {&(0x7f00000167c0)=""/248, 0xf8}, {&(0x7f00000168c0)=""/124, 0x7c}], 0x4, &(0x7f0000016980)=""/35, 0x23}, 0x400}, {{&(0x7f00000169c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000016e00)=[{&(0x7f0000016a40)=""/67, 0x43}, {&(0x7f0000016ac0)=""/138, 0x8a}, {&(0x7f0000016b80)=""/211, 0xd3}, {&(0x7f0000016c80)=""/63, 0x3f}, {&(0x7f0000016cc0)=""/53, 0x35}, {&(0x7f0000016d00)=""/130, 0x82}, {&(0x7f0000016dc0)=""/42, 0x2a}], 0x7, &(0x7f0000016e80)=""/53, 0x35}, 0x8d}], 0x5, 0x102, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) getsockname$unix(r0, &(0x7f0000000240)=@abs, &(0x7f00000000c0)=0x6e) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000017000)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000170c0)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000171c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000017a80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000017a40)={&(0x7f0000017200)=ANY=[@ANYBLOB='@\b\x00\x00', @ANYRES16=r1, @ANYBLOB="01012dbd7000fddbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="f00002003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000008008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400000001003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="6c01020038000100240600006e6f746966795f70656572735f636f756e740000000000000000000000000000315ccfac0300000008000400bb0c00004000366d4bc3ce0100240081006c625f74785f686173685f746f5f706f72745f6d617070696e670001030000", @ANYRES32=r6, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000800000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000100000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="8800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400080000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r9, @ANYBLOB="3c0002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="7c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000100010040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ffffffff08000600", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400fbffffff08000100", @ANYRES32=r14, @ANYBLOB="7802020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ea47963c08000600", @ANYRES32=r15, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff0f00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400fed3924f64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000034000400070004ff020000008d000002000000000002180007000000ffff03fe01000000018001ff7f000000ff03df00000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000002000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400bf25000008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="9c0102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400010000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r24, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000900000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff070000"], 0x840}, 0x1, 0x0, 0x0, 0x40000}, 0x1) 03:50:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:33 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000400002080020000000000"], 0x1c, 0x2) [ 1693.261655][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:50:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='\\dev/vhost-net\x00', 0x2, 0x0) 03:50:33 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000600002080020000000000"], 0x1c, 0x2) [ 1693.416038][ T5431] bridge0: port 1(bridge_slave_0) entered disabled state [ 1693.451736][ T5435] bridge0: port 1(bridge_slave_0) entered blocking state [ 1693.458886][ T5435] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:33 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@ethernet={0x0, @broadcast}, 0x80) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:33 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000c00002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='\xeedev/vhost-net\x00', 0x2, 0x0) 03:50:33 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000001000002080020000000000"], 0x1c, 0x2) 03:50:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000180)={{0x0, 0x0, 0x10001, 0x0, 0x7fff}, 0x7f, 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000000c0)={0xffff, 0x8000, 0x8e2, 0x483, 0x0, 0x8001}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x7, @mcast2, 0x4ce}}}, 0x90) 03:50:34 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1693.911810][ T5470] bridge0: port 1(bridge_slave_0) entered disabled state [ 1693.980240][ T5478] bridge0: port 1(bridge_slave_0) entered blocking state [ 1693.987394][ T5478] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:34 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000001200002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/.ev/vhost-net\x00', 0x2, 0x0) 03:50:34 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x400000) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000080)={0x0, 0x0, 0x102, 0x3, {0x7, 0x0, 0x1, 0x8}}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x13, "5523ff0f84ae1b1e31062e4a788cfa7efd864d"}, &(0x7f00000001c0)=0x1b) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={r1, 0x2}, &(0x7f0000000280)=0x8) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x480000) fcntl$setlease(r2, 0x400, 0x1) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) 03:50:34 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000003f00002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="030000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='//ev/vhost-net\x00', 0x2, 0x0) 03:50:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x4) 03:50:34 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000004000002080020000000000"], 0x1c, 0x2) [ 1694.394388][ T5515] bridge0: port 1(bridge_slave_0) entered disabled state [ 1694.471035][ T5521] bridge0: port 1(bridge_slave_0) entered blocking state [ 1694.478182][ T5521] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:34 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000ffffff8c00002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/\\ev/vhost-net\x00', 0x2, 0x0) 03:50:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:34 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000fffffff600002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xff', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)) 03:50:34 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/d%v/vhost-net\x00', 0x2, 0x0) 03:50:34 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000fffffffe00002080020000000000"], 0x1c, 0x2) 03:50:34 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xff', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000400000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1694.963280][ T5560] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x4, &(0x7f0000000180)=[{&(0x7f0000000240)="50e24477d7b5f7fe0b2b016de2c4e38fad8a8ce8e934ea9481e59db81d99c597542ed56a37ce4e9ed6c56049bdb7d65c8c27721ebad354af1e9262d5613f61112fa5cfa9a69a26c35a08d74a4bd1607ab3ba526cb56ba2c6c23cc25c830152b99957e0cf927706787b6af40ff21929eb88075cade4d4916023c7a76a618844c8e1f76b83b08d1fb0f21b254421691bba019f3f8043101645c98fe7681dacbf33690131cbdf787fb8bbb7a0723f9fc5c12c0b3084fdbb1c66e1ff624dd8377399a8b567f6863b22409d6aae327e73963ee508a537bca3", 0xd6, 0x3f}, {&(0x7f0000000080)="2044a08149d7544159d9db7fd33eca26f6a0c76544efb5026c", 0x19, 0x2}, {&(0x7f0000000340)="611f629f4f36587646295f3a2fba3be48f5707cff483adf586fb3ebc122996359f9ac3ca9763e83d914db99a0bb2425386bafcbbeaaab2b66bb274894fcae73e4703135e4921b85b1ca7760b59de51de28f2adfebb2e1d413e784fc6fb251095291a49f0acdfac20bc5995df9dee012cd3464854e28e1381da668a256a970e6d8e4d6e698cbd5016437e07cd3b47c1be00a0e00278d54c2aa7a519dbfc13678c69b389f2de6bd454e5173d40b9d05553d6b7d50a59a9e9d972160fa428f2742a0fa9244a190d79c05ab92fce4a3f8d2e9956", 0xd2, 0x8}, {&(0x7f0000000440)="c0a29cdca2b6a6fd024d3295207445ca372652fa5d4d4dfb20ab35788dd370c7117d40fbced3de7b199fd6e9f30ad434726e8fd440bbeccfe86c0df1c69ce527bc53309acf0aab1d15ee2969c71ffcababc00b4c3196e94eb8c15b9477b41089de9b7d747d8118b5877c287e0388b09790f05bb5648032e7744edc9121c936c153e7", 0x82, 0xce}], 0x20000, &(0x7f0000000500)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x80000000}}, {@acl='acl'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 1695.051717][ T9233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1695.074748][ T9233] bridge0: port 1(bridge_slave_0) entered blocking state [ 1695.081891][ T9233] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:35 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000800000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000ff00002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/d\\v/vhost-net\x00', 0x2, 0x0) 03:50:35 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000001000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xf6', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000fff00002080020000000000"], 0x1c, 0x2) [ 1695.341651][ C0] net_ratelimit: 5 callbacks suppressed [ 1695.341657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1695.341661][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1695.341705][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1695.347264][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:50:35 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020200002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/de./vhost-net\x00', 0x2, 0x0) 03:50:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x4, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1ff}, r1}}, 0x30) 03:50:35 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xfe', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1695.526192][ T5605] bridge0: port 1(bridge_slave_0) entered disabled state [ 1695.544873][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 1695.552020][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:35 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10008cffffff00002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020040002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\xff', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sysfs$1(0x1, &(0x7f00000001c0)='selinux:\x00') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x200040, 0x0) bind$netlink(r1, &(0x7f0000000280)={0x10, 0x0, 0x25dfdbfe, 0x80000}, 0xc) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000100), 0x4) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="21619a2fd283550f91c2242834344ac39de5e7be46be71a89c41cd76a536ba0f5a1f8f6fa61d80b7fc527715f00d8b2c7fb2f07f9b93940a874a23d3a41071b634d4bb670cb45594854f63942de9dc82926a86ae0e66499025ba26e50d1ac6f708c1f253d74bb72eef390b33e8b80dea655e6ebb3fa377b87cecc1173406f5f0dceca41b2336e15149139e12ea981060208d1793efaef47f36da2ba88466ac178b258ce63ff5a83a067e3e95c21f5a8d5b3c02003f8a3b537dbd065d3e684964cc29169ecb5fb56d0d1508aedcba2ea7abe13aba8059d0c59ba52bb9c7543a88d47678", 0xffffffffffffff49, 0x9}], 0x0, 0x0) 03:50:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/de//vhost-net\x00', 0x2, 0x0) 03:50:35 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000f6ffffff00002080020000000000"], 0x1c, 0x2) 03:50:35 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020002002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000feffffff00002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000402000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/de\\/vhost-net\x00', 0x2, 0x0) [ 1696.013813][ T5647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1696.157194][ T8749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1696.171251][ T8749] bridge0: port 1(bridge_slave_0) entered blocking state [ 1696.178378][ T8749] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:36 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000002000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000006000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1696.381657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1696.387574][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1696.499891][ T5791] bridge0: port 1(bridge_slave_0) entered disabled state [ 1696.509300][ T5794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1696.516516][ T5794] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:36 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000040)="faf53a4dab35fcf6792efe6b9d242f472865b5634bdd574f465a52e5fd1e5abc4fa02546d8da25b1990659801f68a55a3c8e1d1e915753d6b422083a675e6cc1e5d70f05cabd570564afcfc0ccb35028e69e9acc096d", 0x56) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000240)=""/198) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev\\vhost-net\x00', 0x2, 0x0) 03:50:36 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000022000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000004000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:36 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:36 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000006000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1696.687134][ T5812] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:36 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000006000000002080020000000000"], 0x1c, 0x2) [ 1696.742481][ T5812] bridge0: port 1(bridge_slave_0) entered blocking state [ 1696.749576][ T5812] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev\xeevhost-net\x00', 0x2, 0x0) 03:50:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x7fff, 0x6, &(0x7f0000000440)=[{&(0x7f00000000c0)="7b818f8495051fa888dbfcc07b9cdfe3a2a302", 0x13, 0x8}, {&(0x7f0000000180)="a4bbee939d940b6cebfafcae3d5e69f871e80e2c1062aa2b8fb4e696240faa616caea5f2a17e39b739c71e178ac47e2a677a3d4ef685e38c6d40a1b06f07124b2926366948e5113cabe65d9482d3e620d0", 0x51, 0x4}, {&(0x7f0000000200)="ad5cba1dfe5379ba4401ff51d027488c8c8032f17e4b49de6e59242bad79c209820ced8de6d65d008cabcef47d14613f1daec9626d21dc422a513aa1a79186ffd15825f5d02328a6dc7b267ac493be6e3c19d4ce992ca38a1921ec33", 0x5c, 0x80000000}, {&(0x7f0000000280)="e72bf2c49445500d8e781a19caea4a09345733990895fc6e57bd0e979794f023f90fbcb091be7010dbdfdbc5f94302b1014f903d5afd91c288739c0fa61884b41327beb62769ff038cfa2dc9", 0x4c, 0x5ced}, {&(0x7f0000000300)="b2f72267a9eefb3b3878b2e7b577464c9459c67654a552b2f6da7db876745d81acd026e49974819e715a8919cf923305a2310db703e5c9d8150c049c60dafb8ad313dabe3c226f227c79291ba24b6453cd5c28ff5e22125fcda9009c3bd7917e55b27f337b2961238102423972a8549a8a896a9e83650712600efa8e8eace518ee98e6aed9f60d8d5d60596849d573386b2633c323ac3b19bc736158773fac74df2fbea4715b14c908e7d8d986109a1a", 0xb0, 0xfffffffffffffffe}, {&(0x7f00000003c0)="ebaf33094a13da9fa3f28c9774d51a8a6f4f0c32584ba29b55ee7625b4f1d3220e418a660f8645e0794b433e4887de1b11b6cb0de842bfac60835427ec378cb71f801d951ef91a317f15e4d2c43b4ef587709b0f10e3999a845b314b405a6d7d92783b82", 0x64, 0x4}], 0x800, &(0x7f0000000640)={[{@compress_force='compress-force'}, {@subvol={'subvol', 0x3d, 'btrfs\x00'}}], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@obj_user={'obj_user', 0x3d, '(eth1lo'}}, {@subj_user={'subj_user', 0x3d, 'btrfs\x00'}}, {@fowner_gt={'fowner>', r0}}]}) uselib(&(0x7f0000000000)='./file0\x00') 03:50:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r3, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:36 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000c000000002080020000000000"], 0x1c, 0x2) [ 1696.956887][ T5835] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:37 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000400000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1697.028096][ T5835] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.035225][ T5835] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:37 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/.host-net\x00', 0x2, 0x0) 03:50:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r3, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:37 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000010000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 4: socketpair(0x1f, 0x8000f, 0x400, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xb115}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f00000001c0)=0x4) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000040)={0x79}) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:37 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000800000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1697.253654][ T5864] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:37 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev//host-net\x00', 0x2, 0x0) 03:50:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r3, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1697.335257][ T2157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1697.350976][ T2157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.358129][ T2157] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:37 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000001000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000012000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00', &(0x7f0000000180)=""/111, 0x6f) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x80000) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x7fffffff}, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) [ 1697.492081][ T5889] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:37 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000010000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1697.569643][ T5889] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.576789][ T5889] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/\\host-net\x00', 0x2, 0x0) 03:50:37 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000060000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000020000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:37 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000c0000002080020000000000"], 0x1c, 0x2) 03:50:37 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x6, 0xa80) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x6d44, 0x0, 0xdd4, 0xa0000000000000, 0x0, 0x6, 0x4, 0x0, 0x6, 0x1, 0x8001, 0x7fff, 0x8, 0x5, 0x400, 0x3, 0x800, 0x20, 0x4, 0x8000, 0x4, 0x1, 0xaf90, 0x9, 0x1, 0x0, 0x5, 0x1, 0x7d, 0xa1, 0x6, 0x9d, 0x0, 0x6, 0x8, 0x10000, 0x0, 0x400, 0x5, @perf_bp={&(0x7f0000000040), 0x4}, 0x220, 0x4, 0x3, 0x7, 0xc71, 0x8, 0xffff}, r0, 0x4, r1, 0x9) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xb, 0x26f, &(0x7f0000000200), 0x0, 0x0) [ 1697.815394][ T5924] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:38 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002002000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1697.873104][ T5924] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.880209][ T5924] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/v\\ost-net\x00', 0x2, 0x0) 03:50:38 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000400000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000120000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1698.094009][ T5945] bridge0: port 1(bridge_slave_0) entered disabled state [ 1698.115317][ T5945] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.122493][ T5945] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:38 executing program 4: io_setup(0x3, &(0x7f0000000000)=0x0) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x80000) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x88) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x4203, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x5, 0x400) r5 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x4, 0x440000) r6 = syz_open_dev$vbi(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SIOCX25GFACILITIES(r6, 0x89e2, &(0x7f0000000ac0)) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x2, 0x0) r8 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x10000, 0x0) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0xa0080, 0x0) r11 = syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x3ff, 0x400) r12 = accept$ax25(0xffffffffffffffff, &(0x7f0000000900)={{0x3, @null}, [@bcast, @null, @null, @netrom, @netrom, @null, @netrom, @default]}, &(0x7f0000000980)=0x48) r13 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r14 = syz_open_dev$sg(&(0x7f0000000a80)='/dev/sg#\x00', 0x56, 0x0) r15 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r16 = syz_open_dev$dri(&(0x7f0000000b40)='/dev/dri/card#\x00', 0x8000, 0x400001) r17 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/ubi_ctrl\x00', 0xa0000, 0x0) io_submit(r0, 0x9, &(0x7f0000000cc0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x20, r1, &(0x7f0000000240)="30b199e839d2add204d6e6c874ca4983b537d9eeb709bb32d37b112544837cc28c87832231088160b55c18947738a100988d107e78a7eb1527d2a07f7df89f55d9dd31a51d80ac7df7f4486bfb9dde503c6f3cda04aee7e1c867086c496ec9c19e774c86b0daee7b2564d5ee72f49727783d26bc6aad0eeed91c4a461ff27598d357d0b673aecfc30041e9e6d26433e8d5716a26019cdfb1598d0382c82ef7c62e48432ae42dd969304dc75e3b64e4f142bf", 0xb2, 0x274, 0x0, 0x2, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x100, r3, &(0x7f00000001c0)="e4b1e6f9a15a3c90bb68eb7a7364a01296ca", 0x12, 0xffffffffffffffc1, 0x0, 0x0, r4}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x4, r5, &(0x7f00000003c0)="a7aab64bc8a87a267f5412f9ad70464feba7b956bc724fe1db0164b7345fe5d2d2ef656aa537939f9a8051efdc31be249b72520f5411088ddab011ea522bc190d40ebca338afd2fc40718504d5431e6b7c9b3e71bac4adbc2215e89c00d3096aba20e9c03b299f804e915902921a675185bcef6b573e536d0907b5d8e44c9d31eeb8388ea74a067edc256ed245f12e56d6ccacafcad5cb1e3b61652cf38995f896513c5f5549b9f6e2822ed01b36498164bf7a", 0xb3, 0x400, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xb12, r6, &(0x7f0000000500)="549ed3efc1a61eba33cb658c90180478a129e4eb134755ec6049ab71dda9333d200a7f521d", 0x25, 0x4, 0x0, 0x3, r7}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x9, r8, &(0x7f0000000600)="6eda11bf60c58d3215501c98b880a4f43c516eab5ee81e3589c8cae8c7dfcd45cd217a558b099c3c986e745cca1234c318bbcc260b9d4109131453bbc55791c211113942a65c78eec5cea6f189173817de09a7253d5e9fcec93e6c1e163966845774c488c137cba52c246bfc781f6ade9d6395bdfb15049eabf9025bdc65c5a6c8fa11f5bd94d434bcfdaafd44c859517d493b1b1e29ca57a03a4238e6611618087a826b34ec1382f09dbe0bda7a911c42dcd9c7", 0xb4, 0x4, 0x0, 0x3, r9}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x2, r10, &(0x7f0000000780)="3d79b2a78ff514587427fe5f4a069627858fee56a8d239085013ffe67e8eb841119f76318675679a955f9f4e0db38ca04df0f8d374432280cbc4b257dd71d5a1582276835edf21619f88702811c9b03f3631ef12a78b51f027abf43d280474c9808bc135f2a65faf3ab6835ba3a66d11e87f83611a1da7c0302325b378c4787ca2", 0x81, 0x6, 0x0, 0x0, r11}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb, 0x9, r12, &(0x7f00000009c0)="900714b764b21a8da7e8bb6aaf83cceabaa294bea351817046cdef753ca2eb663d3bf0fa92b21fc38de357a3e71837586214bc69", 0x34, 0xfff, 0x0, 0x4f88bcc42f8dd540, r13}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0xf, 0x8000, r14, &(0x7f0000000ac0), 0x0, 0x65, 0x0, 0x2, r15}, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x8, 0x5, r16, &(0x7f0000000b80)="917effe0aa9c1fd6513acb2a7ff66bcf4665aead28c43ead968af6700d7ab358f1ea7bd0217fc29142c1e0aadad58040bd6bf9696cb8f42bc1fb2edef33a5776e2c47187ce5a9753be075a00aee0246db4b00e0649f4c8e373412f3e75ae1cc8aaddc5693ab4489acf4e2a90c1433eda82902bef7c902335cc251a097e4c0b57d8b8cd2527a8f634cf8f2641e1ce10d13ab3", 0x92, 0x70, 0x0, 0x1, r17}]) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:38 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000200000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000001000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vh\\st-net\x00', 0x2, 0x0) 03:50:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:38 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000003f0000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000002000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="030000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1698.429832][ T5975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1698.461655][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.467436][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:50:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho#t-net\x00', 0x2, 0x0) 03:50:38 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="050000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1698.554066][ T9233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1698.570473][ T9233] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.577607][ T9233] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:38 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000400000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x4a8101) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000040)=0x10001) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000240)={0x0, @reserved}) 03:50:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:38 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000040000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000ff0000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="100000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho%t-net\x00', 0x2, 0x0) [ 1698.788388][ T6007] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:38 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020ffffff8c000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000fff0000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:39 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="242600000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020fffffff6000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x1e, 0x1000}], 0x0, 0x0) 03:50:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho*t-net\x00', 0x2, 0x0) 03:50:39 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000002000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:39 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000208cffffff000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020200000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020f6ffffff000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho+t-net\x00', 0x2, 0x0) 03:50:39 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000001002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc66, &(0x7f0000000200), 0x0, 0x0) 03:50:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) 03:50:39 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020600000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000080000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1699.501670][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1699.501689][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:50:39 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000002002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020c00000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000100000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) 03:50:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho-t-net\x00', 0x2, 0x0) 03:50:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4080, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r1, 0x8000000000009371, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000240)={{0x3, 0x2}, {0x7, 0x8473}, 0x1ff, 0x7, 0xba3}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x7fffffff) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r2, 0x10, 0x1, @ib={0x1b, 0x400, 0x0, {"ecf6eac1e568f2534709a7923aa5c07b"}, 0x3, 0x0, 0x87}}}, 0xa0) 03:50:39 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000004002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="021200000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, 0x0) 03:50:39 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000200000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02f000000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho.t-net\x00', 0x2, 0x0) 03:50:40 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000006002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000000)={0x35ca85fe}) 03:50:40 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000400000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020006000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?'}) 03:50:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000400)='btrfs\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f00000004c0)="8da4363ac0ed0009000000000000004d0100000000000000000084e13a6a0ffa1b86c1b6cdc20000ebff000048aeb800"/63, 0x3f, 0x10002}], 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0), &(0x7f0000000240), &(0x7f0000000280)=0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x5}, [], {0x4, 0x1}, [{0x8, 0x4, r0}, {0x8, 0x0, r1}, {0x8, 0x0, r2}], {0x10, 0x2}, {0x20, 0x1}}, 0x3c, 0x1) 03:50:40 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000c002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho0t-net\x00', 0x2, 0x0) 03:50:40 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000c000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000020000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000010002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?'}) 03:50:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e9, &(0x7f0000000180), 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x8100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 03:50:40 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000004000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020012000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhoXt-net\x00', 0x2, 0x0) 03:50:40 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000012002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?'}) 03:50:40 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000010000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="022624000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vho\\t-net\x00', 0x2, 0x0) 03:50:40 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000020000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 4: rmdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:40 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000003f002080020000000000"], 0x1c, 0x2) 03:50:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:41 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="022426000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000040002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhoct-net\x00', 0x2, 0x0) [ 1700.989086][ T2157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1701.004291][ T2157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1701.011372][ T2157] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:41 executing program 2 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:41 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02003f000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="8da4363ac059c3c128ed0000000000000000004d01000000000000000000000000000000ff24f6f2a2299748aeb81e1b00920efd9a000001", 0x38, 0x2}], 0x0, 0x0) 03:50:41 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000400000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000ffffff8c002080020000000000"], 0x1c, 0x2) [ 1701.223935][ T6431] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:41 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020040000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhodt-net\x00', 0x2, 0x0) 03:50:41 executing program 4: llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/27, 0x1b) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 1701.312853][ T6431] FAULT_INJECTION: forcing a failure. [ 1701.312853][ T6431] name failslab, interval 1, probability 0, space 0, times 0 [ 1701.344556][ T6431] CPU: 1 PID: 6431 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1701.353610][ T6431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1701.363662][ T6431] Call Trace: [ 1701.366944][ T6431] dump_stack+0x172/0x1f0 [ 1701.371268][ T6431] should_fail.cold+0xa/0x15 [ 1701.375844][ T6431] ? fault_create_debugfs_attr+0x180/0x180 [ 1701.381649][ T6431] ? ___might_sleep+0x163/0x280 [ 1701.386480][ T6431] __should_failslab+0x121/0x190 [ 1701.391401][ T6431] should_failslab+0x9/0x14 [ 1701.395894][ T6431] __kmalloc+0x2e0/0x770 [ 1701.400118][ T6431] ? mark_held_locks+0xf0/0xf0 [ 1701.404858][ T6431] ? _parse_integer+0x190/0x190 [ 1701.409688][ T6431] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1701.415388][ T6431] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1701.420938][ T6431] ? tomoyo_path_number_perm+0x193/0x520 [ 1701.426552][ T6431] tomoyo_path_number_perm+0x1dd/0x520 [ 1701.431996][ T6431] ? tomoyo_path_number_perm+0x193/0x520 [ 1701.437615][ T6431] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1701.443429][ T6431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1701.449655][ T6431] ? __kasan_check_read+0x11/0x20 [ 1701.454662][ T6431] ? __fget+0x384/0x560 [ 1701.458796][ T6431] ? ksys_dup3+0x3e0/0x3e0 [ 1701.463193][ T6431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1701.472301][ T6431] ? fput_many+0x12c/0x1a0 [ 1701.476728][ T6431] tomoyo_file_ioctl+0x23/0x30 [ 1701.481471][ T6431] security_file_ioctl+0x77/0xc0 [ 1701.486387][ T6431] ksys_ioctl+0x57/0xd0 [ 1701.490517][ T6431] __x64_sys_ioctl+0x73/0xb0 [ 1701.495096][ T6431] do_syscall_64+0xfa/0x760 [ 1701.499578][ T6431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1701.505447][ T6431] RIP: 0033:0x459829 [ 1701.509318][ T6431] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1701.528986][ T6431] RSP: 002b:00007fcbf7435c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1701.537563][ T6431] RAX: ffffffffffffffda RBX: 00007fcbf7435c90 RCX: 0000000000459829 [ 1701.545529][ T6431] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 [ 1701.553579][ T6431] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1701.561539][ T6431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74366d4 [ 1701.569506][ T6431] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 [ 1701.577888][ T6431] ERROR: Out of memory at tomoyo_realpath_from_path. 03:50:41 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000fffffff6002080020000000000"], 0x1c, 0x2) [ 1701.606733][ T6431] bridge0: port 1(bridge_slave_0) entered blocking state [ 1701.613877][ T6431] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:41 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200f0000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000ffffff8c0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 4: syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file1\x00', 0x4f, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="bcf4c89865f7373e4deda5484a6bcc8bd1b4d32c8ac3ebd413adf259d85354bf5899ef6b36e578f1e6332417d636b7587b5d901a732deac8d903407fceaa51014ff70e70491a43559fe871068ffdf008d93ae952b070", 0x56, 0x2}, {&(0x7f0000000240)="dd4f18d32c5908257edb93cdb3995a973940299afafeeee8452eae7165505eb2576ede4df23ff2233964db60d5b386790e989f8bfec03280a30131590b85d74bc87bcfcf4437e521e2d13179b42b11195f18ed28a7df735830301254004432cb778a85cd42060c3c00ce6f4da98a5869377ad159465282eef357404f1f845d8e50056501f98eef0b4d5a9ac6fa766ec97a72c0d53ccf897bafe83b6dddf38c9d9f18ecb2858ecd56ec22d89b6d24a6f676261142d9caed0cf9447d8c878d3d2634b18f7d4528af16b3153a5fb31158aeaee7ee86b76b60b11963b73add7f04fbad2d11adc44ad204e7b029866851c685b8b5f4b041ec962a71ab88a127", 0xfd, 0x8}], 0x1020000, &(0x7f00000001c0)='btrfs\x00') syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:41 executing program 2 (fault-call:8 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:41 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000fffffffe002080020000000000"], 0x1c, 0x2) 03:50:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhoit-net\x00', 0x2, 0x0) 03:50:41 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000fffffff60000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1701.920118][ T6566] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:42 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000300000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:42 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000ff002080020000000000"], 0x1c, 0x2) 03:50:42 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020008cffffff0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1702.024879][ T6566] FAULT_INJECTION: forcing a failure. [ 1702.024879][ T6566] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.038206][ T6566] CPU: 0 PID: 6566 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1702.047226][ T6566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.057267][ T6566] Call Trace: [ 1702.060549][ T6566] dump_stack+0x172/0x1f0 [ 1702.064891][ T6566] should_fail.cold+0xa/0x15 [ 1702.069479][ T6566] ? fault_create_debugfs_attr+0x180/0x180 [ 1702.075283][ T6566] ? ___might_sleep+0x163/0x280 [ 1702.080127][ T6566] __should_failslab+0x121/0x190 [ 1702.085051][ T6566] should_failslab+0x9/0x14 [ 1702.089543][ T6566] __kmalloc+0x2e0/0x770 [ 1702.093806][ T6566] ? snprintf+0xbb/0xf0 [ 1702.097949][ T6566] ? vsprintf+0x40/0x40 [ 1702.102085][ T6566] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1702.107485][ T6566] tomoyo_encode2.part.0+0xf5/0x400 [ 1702.112678][ T6566] tomoyo_encode+0x2b/0x50 [ 1702.117098][ T6566] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1702.122709][ T6566] ? tomoyo_path_number_perm+0x193/0x520 [ 1702.128322][ T6566] tomoyo_path_number_perm+0x1dd/0x520 [ 1702.133755][ T6566] ? tomoyo_path_number_perm+0x193/0x520 [ 1702.139381][ T6566] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1702.145168][ T6566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1702.151400][ T6566] ? __kasan_check_read+0x11/0x20 [ 1702.156421][ T6566] ? __fget+0x384/0x560 [ 1702.160570][ T6566] ? ksys_dup3+0x3e0/0x3e0 [ 1702.164964][ T6566] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1702.171186][ T6566] ? fput_many+0x12c/0x1a0 [ 1702.175599][ T6566] tomoyo_file_ioctl+0x23/0x30 [ 1702.180380][ T6566] security_file_ioctl+0x77/0xc0 [ 1702.185300][ T6566] ksys_ioctl+0x57/0xd0 [ 1702.189431][ T6566] __x64_sys_ioctl+0x73/0xb0 [ 1702.193996][ T6566] do_syscall_64+0xfa/0x760 [ 1702.198495][ T6566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1702.205783][ T6566] RIP: 0033:0x459829 [ 1702.209659][ T6566] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1702.229239][ T6566] RSP: 002b:00007fcbf7435c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1702.237630][ T6566] RAX: ffffffffffffffda RBX: 00007fcbf7435c90 RCX: 0000000000459829 [ 1702.245580][ T6566] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 [ 1702.253539][ T6566] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1702.261486][ T6566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74366d4 03:50:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vholt-net\x00', 0x2, 0x0) [ 1702.269435][ T6566] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 [ 1702.289031][ T6566] ERROR: Out of memory at tomoyo_realpath_from_path. 03:50:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x2, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) [ 1702.339206][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1702.365392][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1702.372513][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:42 executing program 2 (fault-call:8 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:42 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000f6ffffff0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:42 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000fff002080020000000000"], 0x1c, 0x2) 03:50:42 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000500000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:42 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000200000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1702.521445][ T6602] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhoot-net\x00', 0x2, 0x0) 03:50:42 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000008cffffff002080020000000000"], 0x1c, 0x2) [ 1702.592489][ T6610] FAULT_INJECTION: forcing a failure. [ 1702.592489][ T6610] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.624402][ T6610] CPU: 0 PID: 6610 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 03:50:42 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000040000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1702.633711][ T6610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.643767][ T6610] Call Trace: [ 1702.647067][ T6610] dump_stack+0x172/0x1f0 [ 1702.651585][ T6610] should_fail.cold+0xa/0x15 [ 1702.656191][ T6610] ? fault_create_debugfs_attr+0x180/0x180 [ 1702.662010][ T6610] ? ___might_sleep+0x163/0x280 [ 1702.666864][ T6610] __should_failslab+0x121/0x190 [ 1702.671803][ T6610] should_failslab+0x9/0x14 [ 1702.676300][ T6610] __kmalloc+0x2e0/0x770 [ 1702.680538][ T6610] ? snprintf+0xbb/0xf0 [ 1702.684681][ T6610] ? vsprintf+0x40/0x40 03:50:42 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000100040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1702.688837][ T6610] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1702.694216][ T6610] tomoyo_encode2.part.0+0xf5/0x400 [ 1702.699416][ T6610] tomoyo_encode+0x2b/0x50 [ 1702.703839][ T6610] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1702.709473][ T6610] ? tomoyo_path_number_perm+0x193/0x520 [ 1702.715106][ T6610] tomoyo_path_number_perm+0x1dd/0x520 [ 1702.720564][ T6610] ? tomoyo_path_number_perm+0x193/0x520 [ 1702.726207][ T6610] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1702.732018][ T6610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1702.738257][ T6610] ? __kasan_check_read+0x11/0x20 03:50:42 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000200040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1702.743272][ T6610] ? __fget+0x384/0x560 [ 1702.747420][ T6610] ? ksys_dup3+0x3e0/0x3e0 [ 1702.751924][ T6610] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1702.758173][ T6610] ? fput_many+0x12c/0x1a0 [ 1702.762680][ T6610] tomoyo_file_ioctl+0x23/0x30 [ 1702.767532][ T6610] security_file_ioctl+0x77/0xc0 [ 1702.772480][ T6610] ksys_ioctl+0x57/0xd0 [ 1702.776642][ T6610] __x64_sys_ioctl+0x73/0xb0 [ 1702.781228][ T6610] do_syscall_64+0xfa/0x760 [ 1702.785728][ T6610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1702.791613][ T6610] RIP: 0033:0x459829 [ 1702.795501][ T6610] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1702.815095][ T6610] RSP: 002b:00007fcbf7414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1702.823486][ T6610] RAX: ffffffffffffffda RBX: 00007fcbf7414c90 RCX: 0000000000459829 [ 1702.831456][ T6610] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 03:50:42 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000001000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1702.839411][ T6610] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1702.847374][ T6610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74156d4 [ 1702.855359][ T6610] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 [ 1702.871819][ T6610] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1702.880330][ T6610] bridge0: port 1(bridge_slave_0) entered blocking state 03:50:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x7, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="ca000000430a6103b0d1a9705b4b68bfb92b1a425c027e94532bfc89ad44fd95657c294d3417a3d2aa322c531e322695953b3d6a4473e95eac35b556be12f77af3ecbcce9103dbfd4d1dd057fc8f997dd8757bdfadf96280ed9a8e0c082b2659da522c1edba50df47af3308c225350771c9c6f57126f4ee1b7f1f89a221a7f87623a3521e3ea88b0c99a946a88390c90d808a9447fd404015d61889ad2dcc538dde9a37df4b4b421a229489e938c0c7f423a66eb525b61e28dfa218f99e78f43070273212f3e342b9c26b8174d818b09249d56241f8a6b9831285fd4fb96"], &(0x7f0000000040)=0x2) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x46c4}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000340)={r2, @in={{0x2, 0x4e20, @remote}}}, 0x384) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x100, 0xa) [ 1702.887492][ T6610] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:43 executing program 2 (fault-call:8 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:43 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000004000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:43 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000f6ffffff002080020000000000"], 0x1c, 0x2) 03:50:43 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000262400000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:43 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000ffffff8c00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhopt-net\x00', 0x2, 0x0) 03:50:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x1, r1}) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x18801) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000240)={0x0, 0xa, 0xa, "c64e15a090a5de15bed659565991c0c3f549b8fb18278a72b03d350f61ca073d839d4b53997834a7e0c8005b0e5f113b36c4e66a1f34378e077e0dd8", 0x38, "f70bced36a29bfe62bfd6cb5301e12e673a6026ce4dfbbd5e8cf68187cf6ef3ee01de69e529e0fa855bec9233db2bc22659352b09cd975ef30740046", 0xf8}) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) fanotify_init(0x1, 0x101000) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x222000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0206416, &(0x7f0000000040)={0x1, 0x4, 0x91e, 0x5, 0x2, 0x120000000000}) 03:50:43 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000feffffff002080020000000000"], 0x1c, 0x2) [ 1703.123813][ T6742] bridge0: port 1(bridge_slave_0) entered disabled state [ 1703.181965][ T6748] FAULT_INJECTION: forcing a failure. [ 1703.181965][ T6748] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.233431][ T6748] CPU: 1 PID: 6748 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1703.242492][ T6748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.252557][ T6748] Call Trace: [ 1703.255860][ T6748] dump_stack+0x172/0x1f0 [ 1703.260200][ T6748] should_fail.cold+0xa/0x15 [ 1703.264803][ T6748] ? fault_create_debugfs_attr+0x180/0x180 [ 1703.270616][ T6748] ? br_get_link_af_size_filtered+0x13c/0xa00 [ 1703.276699][ T6748] __should_failslab+0x121/0x190 [ 1703.281639][ T6748] should_failslab+0x9/0x14 [ 1703.286141][ T6748] kmem_cache_alloc_node+0x56/0x740 [ 1703.291340][ T6748] ? br_get_link_af_size_filtered+0x289/0xa00 [ 1703.297411][ T6748] __alloc_skb+0xd5/0x5e0 [ 1703.301746][ T6748] ? netdev_alloc_frag+0x1b0/0x1b0 [ 1703.306870][ T6748] ? if_nlmsg_size+0x4ad/0x9e0 [ 1703.311640][ T6748] rtmsg_ifinfo_build_skb+0x74/0x190 [ 1703.316933][ T6748] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 1703.322572][ T6748] rtmsg_ifinfo+0x8d/0xa0 [ 1703.326910][ T6748] __dev_notify_flags+0x235/0x2c0 [ 1703.331936][ T6748] ? dev_change_name+0xa70/0xa70 [ 1703.336877][ T6748] ? __dev_change_flags+0x510/0x6e0 [ 1703.342077][ T6748] ? dev_set_allmulti+0x30/0x30 [ 1703.346934][ T6748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.353176][ T6748] ? security_capable+0x95/0xc0 [ 1703.358036][ T6748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.364279][ T6748] dev_change_flags+0x10d/0x170 [ 1703.369138][ T6748] devinet_ioctl+0x1407/0x1c90 [ 1703.373910][ T6748] inet_ioctl+0x1f4/0x340 [ 1703.378245][ T6748] ? kfree+0x10a/0x2c0 [ 1703.382318][ T6748] ? tomoyo_path_number_perm+0x459/0x520 [ 1703.387956][ T6748] ? inet_dgram_connect+0x2d0/0x2d0 [ 1703.393157][ T6748] ? __x64_sys_ioctl+0x73/0xb0 [ 1703.397947][ T6748] ? do_syscall_64+0xfa/0x760 [ 1703.402631][ T6748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.408708][ T6748] ? debug_check_no_obj_freed+0x20a/0x43f [ 1703.414428][ T6748] ? __kasan_check_read+0x11/0x20 [ 1703.419459][ T6748] ? __kasan_check_write+0x14/0x20 [ 1703.424579][ T6748] ? lock_downgrade+0x920/0x920 [ 1703.429433][ T6748] ? rwlock_bug.part.0+0x90/0x90 [ 1703.434375][ T6748] ? debug_check_no_obj_freed+0xc0/0x43f [ 1703.440019][ T6748] packet_ioctl+0xb8/0x260 [ 1703.444442][ T6748] sock_do_ioctl+0xd8/0x2f0 [ 1703.448949][ T6748] ? compat_ifr_data_ioctl+0x160/0x160 [ 1703.454409][ T6748] ? trace_hardirqs_on+0x67/0x240 [ 1703.459439][ T6748] ? tomoyo_path_number_perm+0x459/0x520 [ 1703.465075][ T6748] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1703.471322][ T6748] ? tomoyo_path_number_perm+0x263/0x520 [ 1703.476976][ T6748] sock_ioctl+0x3ed/0x790 [ 1703.481313][ T6748] ? dlci_ioctl_set+0x40/0x40 [ 1703.486011][ T6748] ? __kasan_check_read+0x11/0x20 [ 1703.491029][ T6748] ? dlci_ioctl_set+0x40/0x40 [ 1703.495700][ T6748] do_vfs_ioctl+0xdb6/0x13e0 [ 1703.500291][ T6748] ? ioctl_preallocate+0x210/0x210 [ 1703.505399][ T6748] ? __fget+0x384/0x560 [ 1703.509555][ T6748] ? ksys_dup3+0x3e0/0x3e0 [ 1703.513976][ T6748] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1703.520234][ T6748] ? fput_many+0x12c/0x1a0 [ 1703.524653][ T6748] ? tomoyo_file_ioctl+0x23/0x30 03:50:43 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000004000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1703.529591][ T6748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.535844][ T6748] ? security_file_ioctl+0x8d/0xc0 [ 1703.540968][ T6748] ksys_ioctl+0xab/0xd0 [ 1703.545130][ T6748] __x64_sys_ioctl+0x73/0xb0 [ 1703.549724][ T6748] do_syscall_64+0xfa/0x760 [ 1703.554227][ T6748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.560114][ T6748] RIP: 0033:0x459829 [ 1703.564010][ T6748] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1703.583612][ T6748] RSP: 002b:00007fcbf7414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1703.592029][ T6748] RAX: ffffffffffffffda RBX: 00007fcbf7414c90 RCX: 0000000000459829 [ 1703.600017][ T6748] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 [ 1703.608001][ T6748] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1703.615983][ T6748] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74156d4 [ 1703.623964][ T6748] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 [ 1703.645761][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 03:50:43 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000020000002080020000000000"], 0x1c, 0x2) 03:50:43 executing program 2 (fault-call:8 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:43 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000fffffff600040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:43 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020002000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1703.697763][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 1703.704905][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 03:50:43 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000040000002080020000000000"], 0x1c, 0x2) 03:50:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhout-net\x00', 0x2, 0x0) 03:50:44 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000008cffffff00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:44 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020006000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1703.917718][ T6794] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000680)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f0000000080)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, &(0x7f00000000c0)=""/19, 0x13}, 0x9}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/17, 0x11}], 0x1, &(0x7f0000000240)=""/164, 0xa4}, 0x2}, {{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000600)=[{&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000440)=""/231, 0xe7}, {&(0x7f0000000540)=""/25, 0x19}, {&(0x7f0000000580)=""/69, 0x45}], 0x4, &(0x7f0000000640)=""/45, 0x2d}, 0x8}], 0x3, 0x0, &(0x7f0000000780)={r1, r2+30000000}) [ 1704.005484][ T6794] FAULT_INJECTION: forcing a failure. [ 1704.005484][ T6794] name failslab, interval 1, probability 0, space 0, times 0 03:50:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhoxt-net\x00', 0x2, 0x0) [ 1704.083959][ T6794] CPU: 0 PID: 6794 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1704.093011][ T6794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1704.103160][ T6794] Call Trace: [ 1704.106476][ T6794] dump_stack+0x172/0x1f0 [ 1704.110812][ T6794] should_fail.cold+0xa/0x15 [ 1704.115407][ T6794] ? lock_acquire+0x190/0x410 [ 1704.120091][ T6794] ? fault_create_debugfs_attr+0x180/0x180 [ 1704.125904][ T6794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1704.132147][ T6794] ? should_fail+0x1de/0x852 [ 1704.136754][ T6794] __should_failslab+0x121/0x190 [ 1704.141694][ T6794] should_failslab+0x9/0x14 [ 1704.146193][ T6794] kmem_cache_alloc_node_trace+0x5a/0x750 [ 1704.152079][ T6794] ? kasan_unpoison_shadow+0x35/0x50 [ 1704.157439][ T6794] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1704.163240][ T6794] __kmalloc_node_track_caller+0x3d/0x70 [ 1704.168857][ T6794] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1704.174214][ T6794] __alloc_skb+0x10b/0x5e0 [ 1704.178615][ T6794] ? netdev_alloc_frag+0x1b0/0x1b0 [ 1704.183710][ T6794] ? if_nlmsg_size+0x4ad/0x9e0 [ 1704.188464][ T6794] rtmsg_ifinfo_build_skb+0x74/0x190 [ 1704.193734][ T6794] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 1704.199176][ T6794] rtmsg_ifinfo+0x8d/0xa0 [ 1704.204580][ T6794] __dev_notify_flags+0x235/0x2c0 [ 1704.209840][ T6794] ? dev_change_name+0xa70/0xa70 [ 1704.214773][ T6794] ? __dev_change_flags+0x510/0x6e0 [ 1704.219958][ T6794] ? dev_set_allmulti+0x30/0x30 [ 1704.224816][ T6794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1704.231037][ T6794] ? security_capable+0x95/0xc0 [ 1704.235870][ T6794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1704.242093][ T6794] dev_change_flags+0x10d/0x170 [ 1704.246929][ T6794] devinet_ioctl+0x1407/0x1c90 [ 1704.251686][ T6794] inet_ioctl+0x1f4/0x340 [ 1704.255995][ T6794] ? kfree+0x10a/0x2c0 [ 1704.260047][ T6794] ? tomoyo_path_number_perm+0x459/0x520 [ 1704.265662][ T6794] ? inet_dgram_connect+0x2d0/0x2d0 [ 1704.270839][ T6794] ? __x64_sys_ioctl+0x73/0xb0 [ 1704.275587][ T6794] ? do_syscall_64+0xfa/0x760 [ 1704.280250][ T6794] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1704.286307][ T6794] ? debug_check_no_obj_freed+0x20a/0x43f [ 1704.292011][ T6794] ? __kasan_check_read+0x11/0x20 [ 1704.297018][ T6794] ? __kasan_check_write+0x14/0x20 [ 1704.302112][ T6794] ? lock_downgrade+0x920/0x920 [ 1704.306946][ T6794] ? rwlock_bug.part.0+0x90/0x90 [ 1704.311872][ T6794] ? debug_check_no_obj_freed+0xc0/0x43f [ 1704.317490][ T6794] packet_ioctl+0xb8/0x260 [ 1704.321903][ T6794] sock_do_ioctl+0xd8/0x2f0 [ 1704.326386][ T6794] ? compat_ifr_data_ioctl+0x160/0x160 [ 1704.331832][ T6794] ? trace_hardirqs_on+0x67/0x240 [ 1704.336856][ T6794] ? tomoyo_path_number_perm+0x459/0x520 [ 1704.342477][ T6794] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1704.348697][ T6794] ? tomoyo_path_number_perm+0x263/0x520 [ 1704.354320][ T6794] sock_ioctl+0x3ed/0x790 [ 1704.358630][ T6794] ? dlci_ioctl_set+0x40/0x40 [ 1704.363288][ T6794] ? __kasan_check_read+0x11/0x20 [ 1704.368307][ T6794] ? dlci_ioctl_set+0x40/0x40 [ 1704.372990][ T6794] do_vfs_ioctl+0xdb6/0x13e0 [ 1704.377564][ T6794] ? ioctl_preallocate+0x210/0x210 [ 1704.382656][ T6794] ? __fget+0x384/0x560 [ 1704.386806][ T6794] ? ksys_dup3+0x3e0/0x3e0 [ 1704.391205][ T6794] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1704.397424][ T6794] ? fput_many+0x12c/0x1a0 [ 1704.401838][ T6794] ? tomoyo_file_ioctl+0x23/0x30 [ 1704.406756][ T6794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1704.412975][ T6794] ? security_file_ioctl+0x8d/0xc0 [ 1704.418068][ T6794] ksys_ioctl+0xab/0xd0 [ 1704.422207][ T6794] __x64_sys_ioctl+0x73/0xb0 [ 1704.426785][ T6794] do_syscall_64+0xfa/0x760 [ 1704.431284][ T6794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1704.437153][ T6794] RIP: 0033:0x459829 [ 1704.441030][ T6794] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1704.460701][ T6794] RSP: 002b:00007fcbf7435c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1704.469178][ T6794] RAX: ffffffffffffffda RBX: 00007fcbf7435c90 RCX: 0000000000459829 [ 1704.477137][ T6794] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 03:50:44 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000f6ffffff00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:44 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000c000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1704.485091][ T6794] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1704.493043][ T6794] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74366d4 [ 1704.501170][ T6794] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 [ 1704.558692][ T6794] bridge0: port 1(bridge_slave_0) entered blocking state [ 1704.565955][ T6794] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:44 executing program 2 (fault-call:8 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:44 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000060000002080020000000000"], 0x1c, 0x2) 03:50:44 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000002000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:44 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020012000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhos/-net\x00', 0x2, 0x0) [ 1704.732786][ T6829] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:44 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000400000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1704.821981][ T6840] FAULT_INJECTION: forcing a failure. [ 1704.821981][ T6840] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1704.835212][ T6840] CPU: 0 PID: 6840 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1704.844226][ T6840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1704.854275][ T6840] Call Trace: [ 1704.857573][ T6840] dump_stack+0x172/0x1f0 [ 1704.861895][ T6840] should_fail.cold+0xa/0x15 [ 1704.866561][ T6840] ? fault_create_debugfs_attr+0x180/0x180 [ 1704.872346][ T6840] ? save_stack+0x5c/0x90 [ 1704.876657][ T6840] ? save_stack+0x23/0x90 [ 1704.880975][ T6840] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1704.886763][ T6840] ? kasan_slab_alloc+0xf/0x20 [ 1704.891605][ T6840] ? kmem_cache_alloc_node+0x138/0x740 [ 1704.897311][ T6840] ? __alloc_skb+0xd5/0x5e0 [ 1704.901800][ T6840] ? rtmsg_ifinfo_build_skb+0x74/0x190 [ 1704.907244][ T6840] should_fail_alloc_page+0x50/0x60 [ 1704.912421][ T6840] __alloc_pages_nodemask+0x1a1/0x900 [ 1704.917860][ T6840] ? ksys_ioctl+0xab/0xd0 [ 1704.922170][ T6840] ? __x64_sys_ioctl+0x73/0xb0 [ 1704.927003][ T6840] ? do_syscall_64+0xfa/0x760 [ 1704.931747][ T6840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1704.937807][ T6840] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1704.943507][ T6840] ? __queue_work+0x599/0x1270 [ 1704.948272][ T6840] ? __kasan_check_read+0x11/0x20 [ 1704.953282][ T6840] ? lock_downgrade+0x920/0x920 [ 1704.958116][ T6840] ? fault_create_debugfs_attr+0x180/0x180 [ 1704.963913][ T6840] cache_grow_begin+0x90/0xd20 [ 1704.968658][ T6840] ? __kmalloc_node_track_caller+0x3d/0x70 [ 1704.974541][ T6840] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1704.980768][ T6840] kmem_cache_alloc_node_trace+0x689/0x750 [ 1704.986552][ T6840] ? kasan_unpoison_shadow+0x35/0x50 [ 1704.991818][ T6840] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1704.997611][ T6840] __kmalloc_node_track_caller+0x3d/0x70 [ 1705.003238][ T6840] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1705.008593][ T6840] __alloc_skb+0x10b/0x5e0 [ 1705.012992][ T6840] ? netdev_alloc_frag+0x1b0/0x1b0 [ 1705.018085][ T6840] ? if_nlmsg_size+0x4ad/0x9e0 [ 1705.022834][ T6840] rtmsg_ifinfo_build_skb+0x74/0x190 [ 1705.028105][ T6840] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 1705.033547][ T6840] rtmsg_ifinfo+0x8d/0xa0 [ 1705.037858][ T6840] __dev_notify_flags+0x235/0x2c0 [ 1705.042864][ T6840] ? dev_change_name+0xa70/0xa70 [ 1705.047784][ T6840] ? __dev_change_flags+0x510/0x6e0 [ 1705.052963][ T6840] ? dev_set_allmulti+0x30/0x30 [ 1705.057798][ T6840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1705.064020][ T6840] ? security_capable+0x95/0xc0 [ 1705.068852][ T6840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1705.075078][ T6840] dev_change_flags+0x10d/0x170 [ 1705.079915][ T6840] devinet_ioctl+0x1407/0x1c90 [ 1705.084669][ T6840] inet_ioctl+0x1f4/0x340 [ 1705.088979][ T6840] ? kfree+0x10a/0x2c0 [ 1705.093043][ T6840] ? tomoyo_path_number_perm+0x459/0x520 [ 1705.098653][ T6840] ? inet_dgram_connect+0x2d0/0x2d0 [ 1705.103829][ T6840] ? __x64_sys_ioctl+0x73/0xb0 [ 1705.108575][ T6840] ? do_syscall_64+0xfa/0x760 [ 1705.113233][ T6840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1705.119287][ T6840] ? debug_check_no_obj_freed+0x20a/0x43f [ 1705.124984][ T6840] ? __kasan_check_read+0x11/0x20 [ 1705.130018][ T6840] ? __kasan_check_write+0x14/0x20 [ 1705.135109][ T6840] ? lock_downgrade+0x920/0x920 [ 1705.139941][ T6840] ? rwlock_bug.part.0+0x90/0x90 [ 1705.145032][ T6840] ? debug_check_no_obj_freed+0xc0/0x43f [ 1705.150652][ T6840] packet_ioctl+0xb8/0x260 [ 1705.155061][ T6840] sock_do_ioctl+0xd8/0x2f0 [ 1705.159546][ T6840] ? compat_ifr_data_ioctl+0x160/0x160 [ 1705.164997][ T6840] ? trace_hardirqs_on+0x67/0x240 [ 1705.170004][ T6840] ? tomoyo_path_number_perm+0x459/0x520 [ 1705.175623][ T6840] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1705.181855][ T6840] ? tomoyo_path_number_perm+0x263/0x520 [ 1705.187477][ T6840] sock_ioctl+0x3ed/0x790 [ 1705.191797][ T6840] ? dlci_ioctl_set+0x40/0x40 [ 1705.196459][ T6840] ? __kasan_check_read+0x11/0x20 [ 1705.201471][ T6840] ? dlci_ioctl_set+0x40/0x40 [ 1705.206129][ T6840] do_vfs_ioctl+0xdb6/0x13e0 [ 1705.210713][ T6840] ? ioctl_preallocate+0x210/0x210 [ 1705.215804][ T6840] ? __fget+0x384/0x560 [ 1705.219943][ T6840] ? ksys_dup3+0x3e0/0x3e0 [ 1705.224339][ T6840] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1705.230562][ T6840] ? fput_many+0x12c/0x1a0 [ 1705.234963][ T6840] ? tomoyo_file_ioctl+0x23/0x30 [ 1705.239881][ T6840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1705.246101][ T6840] ? security_file_ioctl+0x8d/0xc0 [ 1705.251196][ T6840] ksys_ioctl+0xab/0xd0 [ 1705.255333][ T6840] __x64_sys_ioctl+0x73/0xb0 [ 1705.259910][ T6840] do_syscall_64+0xfa/0x760 [ 1705.264398][ T6840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1705.270271][ T6840] RIP: 0033:0x459829 [ 1705.274156][ T6840] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1705.293824][ T6840] RSP: 002b:00007fcbf7414c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1705.302219][ T6840] RAX: ffffffffffffffda RBX: 00007fcbf7414c90 RCX: 0000000000459829 [ 1705.310181][ T6840] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 03:50:45 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000c0000002080020000000000"], 0x1c, 0x2) [ 1705.318134][ T6840] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1705.326084][ T6840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74156d4 [ 1705.334046][ T6840] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 03:50:45 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200f0000200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1705.371536][ T6840] bridge0: port 1(bridge_slave_0) entered blocking state [ 1705.378736][ T6840] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$P9_RFLUSH(r0, &(0x7f00000000c0)={0x7, 0x6d, 0x1}, 0x7) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x2, &(0x7f0000000080)={0x7ff}, 0xffffffffffffff96) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 03:50:45 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000001040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:45 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000060200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:45 executing program 2 (fault-call:8 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:45 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000100000002080020000000000"], 0x1c, 0x2) 03:50:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhos\\-net\x00', 0x2, 0x0) 03:50:45 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000c0200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1705.621421][ T6870] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:45 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000002040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1705.661653][ C1] net_ratelimit: 2 callbacks suppressed [ 1705.661661][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1705.673040][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1705.673121][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1705.684640][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1705.690423][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1705.696210][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:50:45 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000040040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1705.729992][ T6870] FAULT_INJECTION: forcing a failure. [ 1705.729992][ T6870] name failslab, interval 1, probability 0, space 0, times 0 03:50:45 executing program 4: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x6000) accept$netrom(r1, &(0x7f0000000280)={{0x3, @null}, [@null, @rose, @default, @remote, @rose, @bcast, @null, @default]}, &(0x7f0000000300)=0x48) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={r2, 0x3}, &(0x7f0000000200)=0x8) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000000010000}], 0x0, 0x0) 03:50:45 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000ffffff8c040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:45 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000120000002080020000000000"], 0x1c, 0x2) [ 1705.831738][ T6870] CPU: 1 PID: 6870 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1705.840797][ T6870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1705.850854][ T6870] Call Trace: [ 1705.854154][ T6870] dump_stack+0x172/0x1f0 [ 1705.858492][ T6870] should_fail.cold+0xa/0x15 [ 1705.863089][ T6870] ? fault_create_debugfs_attr+0x180/0x180 [ 1705.868904][ T6870] ? page_to_nid.part.0+0x20/0x20 [ 1705.873931][ T6870] ? ___might_sleep+0x163/0x280 [ 1705.878784][ T6870] __should_failslab+0x121/0x190 [ 1705.883727][ T6870] should_failslab+0x9/0x14 [ 1705.888227][ T6870] kmem_cache_alloc_trace+0x2d3/0x790 [ 1705.893600][ T6870] ? __kasan_check_read+0x11/0x20 [ 1705.898656][ T6870] ? __kasan_check_write+0x14/0x20 [ 1705.903763][ T6870] netdevice_event+0x1c8/0x810 [ 1705.908524][ T6870] ? __kasan_check_write+0x14/0x20 [ 1705.913641][ T6870] ? update_gid_event_work_handler+0xc0/0xc0 [ 1705.919621][ T6870] ? add_netdev_ips+0x40/0x40 [ 1705.924296][ T6870] ? upper_device_filter+0x1b0/0x1b0 [ 1705.929581][ T6870] ? rdma_roce_rescan_device+0x30/0x30 [ 1705.935037][ T6870] ? is_ndev_for_default_gid_filter.part.0+0x270/0x270 [ 1705.941884][ T6870] ? enum_all_gids_of_dev_cb+0x210/0x210 [ 1705.947515][ T6870] ? is_eth_port_of_netdev_filter.part.0+0x2d0/0x2d0 [ 1705.954211][ T6870] ? cfg802154_netdev_notifier_call+0x2e1/0x680 [ 1705.960456][ T6870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1705.966963][ T6870] notifier_call_chain+0xc2/0x230 [ 1705.974130][ T6870] raw_notifier_call_chain+0x2e/0x40 03:50:46 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000120200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1705.979426][ T6870] call_netdevice_notifiers_info+0x3f/0x90 [ 1705.985237][ T6870] __dev_notify_flags+0x121/0x2c0 [ 1705.990261][ T6870] ? dev_change_name+0xa70/0xa70 [ 1705.995200][ T6870] ? __dev_change_flags+0x510/0x6e0 [ 1706.000406][ T6870] ? dev_set_allmulti+0x30/0x30 [ 1706.005265][ T6870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.011505][ T6870] ? security_capable+0x95/0xc0 [ 1706.016438][ T6870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.022686][ T6870] dev_change_flags+0x10d/0x170 [ 1706.027541][ T6870] devinet_ioctl+0x1407/0x1c90 [ 1706.032320][ T6870] inet_ioctl+0x1f4/0x340 [ 1706.037523][ T6870] ? kfree+0x10a/0x2c0 [ 1706.041600][ T6870] ? tomoyo_path_number_perm+0x459/0x520 [ 1706.047230][ T6870] ? inet_dgram_connect+0x2d0/0x2d0 [ 1706.052425][ T6870] ? __x64_sys_ioctl+0x73/0xb0 [ 1706.057189][ T6870] ? do_syscall_64+0xfa/0x760 [ 1706.061870][ T6870] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1706.067941][ T6870] ? debug_check_no_obj_freed+0x20a/0x43f [ 1706.073660][ T6870] ? __kasan_check_read+0x11/0x20 [ 1706.078689][ T6870] ? __kasan_check_write+0x14/0x20 [ 1706.083814][ T6870] ? lock_downgrade+0x920/0x920 [ 1706.088674][ T6870] ? rwlock_bug.part.0+0x90/0x90 [ 1706.093654][ T6870] ? debug_check_no_obj_freed+0xc0/0x43f [ 1706.099302][ T6870] packet_ioctl+0xb8/0x260 [ 1706.103726][ T6870] sock_do_ioctl+0xd8/0x2f0 [ 1706.108250][ T6870] ? compat_ifr_data_ioctl+0x160/0x160 [ 1706.113703][ T6870] ? trace_hardirqs_on+0x67/0x240 [ 1706.118717][ T6870] ? tomoyo_path_number_perm+0x459/0x520 [ 1706.124333][ T6870] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1706.130552][ T6870] ? tomoyo_path_number_perm+0x263/0x520 [ 1706.136164][ T6870] sock_ioctl+0x3ed/0x790 [ 1706.140474][ T6870] ? dlci_ioctl_set+0x40/0x40 [ 1706.145127][ T6870] ? __kasan_check_read+0x11/0x20 [ 1706.150127][ T6870] ? dlci_ioctl_set+0x40/0x40 [ 1706.154787][ T6870] do_vfs_ioctl+0xdb6/0x13e0 [ 1706.159357][ T6870] ? ioctl_preallocate+0x210/0x210 [ 1706.164460][ T6870] ? __fget+0x384/0x560 [ 1706.168594][ T6870] ? ksys_dup3+0x3e0/0x3e0 [ 1706.172998][ T6870] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1706.179228][ T6870] ? fput_many+0x12c/0x1a0 [ 1706.183631][ T6870] ? tomoyo_file_ioctl+0x23/0x30 [ 1706.188545][ T6870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.194761][ T6870] ? security_file_ioctl+0x8d/0xc0 [ 1706.199858][ T6870] ksys_ioctl+0xab/0xd0 [ 1706.203993][ T6870] __x64_sys_ioctl+0x73/0xb0 [ 1706.208569][ T6870] do_syscall_64+0xfa/0x760 [ 1706.213074][ T6870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1706.218949][ T6870] RIP: 0033:0x459829 [ 1706.222830][ T6870] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1706.244143][ T6870] RSP: 002b:00007fcbf7435c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1706.252543][ T6870] RAX: ffffffffffffffda RBX: 00007fcbf7435c90 RCX: 0000000000459829 [ 1706.260613][ T6870] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 [ 1706.270480][ T6870] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:50:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost\\net\x00', 0x2, 0x0) [ 1706.278444][ T6870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74366d4 [ 1706.286407][ T6870] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 [ 1706.297887][ T2157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1706.330784][ T2157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1706.337910][ T2157] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:46 executing program 2 (fault-call:8 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:46 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000fffffff6040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:46 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000600002080020000000000"], 0x1c, 0x2) 03:50:46 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020026240200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@x25={0x9, @remote}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000180)=0x4) 03:50:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost\xeenet\x00', 0x2, 0x0) [ 1706.493202][ T6913] bridge0: port 1(bridge_slave_0) entered disabled state [ 1706.536037][ T6913] FAULT_INJECTION: forcing a failure. [ 1706.536037][ T6913] name failslab, interval 1, probability 0, space 0, times 0 [ 1706.548695][ T6913] CPU: 0 PID: 6913 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1706.548704][ T6913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1706.548708][ T6913] Call Trace: [ 1706.548730][ T6913] dump_stack+0x172/0x1f0 [ 1706.548750][ T6913] should_fail.cold+0xa/0x15 [ 1706.548763][ T6913] ? should_fail+0x1de/0x852 [ 1706.548778][ T6913] ? fault_create_debugfs_attr+0x180/0x180 [ 1706.548790][ T6913] ? fault_create_debugfs_attr+0x180/0x180 [ 1706.548802][ T6913] ? save_stack+0x5c/0x90 [ 1706.548812][ T6913] ? save_stack+0x23/0x90 [ 1706.548823][ T6913] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1706.548834][ T6913] ? kasan_kmalloc+0x9/0x10 [ 1706.548843][ T6913] ? kmem_cache_alloc_trace+0x158/0x790 [ 1706.548863][ T6913] ? ____ip_mc_inc_group.constprop.0+0x27c/0xc20 [ 1706.580052][ T6913] __should_failslab+0x121/0x190 [ 1706.580066][ T6913] should_failslab+0x9/0x14 [ 1706.580077][ T6913] kmem_cache_alloc_trace+0x4b/0x790 [ 1706.580091][ T6913] ? __dev_mc_add+0x9f/0xd0 [ 1706.580102][ T6913] ? __kasan_check_read+0x11/0x20 [ 1706.580117][ T6913] __hw_addr_create_ex+0x5e/0x310 [ 1706.580136][ T6913] __hw_addr_add_ex+0x1ef/0x2b0 [ 1706.600630][ T6913] __dev_mc_add+0x80/0xd0 [ 1706.600647][ T6913] dev_mc_add+0x20/0x30 [ 1706.600663][ T6913] igmp6_group_added+0x3b5/0x460 [ 1706.600678][ T6913] ? igmp6_join_group.part.0+0x2e0/0x2e0 [ 1706.600697][ T6913] ? _raw_spin_unlock_bh+0x31/0x40 [ 1706.610785][ T6913] ? mld_del_delrec+0x2da/0x530 [ 1706.610802][ T6913] ipv6_mc_up+0x73/0xc0 [ 1706.610816][ T6913] ipv6_find_idev+0x109/0x210 [ 1706.610830][ T6913] addrconf_add_dev+0x38/0x1d0 [ 1706.610843][ T6913] addrconf_dev_config+0x178/0x2c0 [ 1706.610858][ T6913] addrconf_notify+0x3bf/0x2370 [ 1706.610872][ T6913] ? lock_downgrade+0x920/0x920 [ 1706.610890][ T6913] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1706.656478][ T6913] ? inet6_ifinfo_notify+0x150/0x150 [ 1706.665607][ T6913] ? tls_device_gc_task+0x550/0x550 [ 1706.665622][ T6913] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1706.665634][ T6913] ? ip6mr_device_event+0x1ad/0x220 [ 1706.665654][ T6913] notifier_call_chain+0xc2/0x230 [ 1706.725065][ T6913] ? notifier_call_chain+0xc2/0x230 [ 1706.735492][ T6913] raw_notifier_call_chain+0x2e/0x40 [ 1706.735507][ T6913] call_netdevice_notifiers_info+0x3f/0x90 [ 1706.735525][ T6913] __dev_notify_flags+0x121/0x2c0 [ 1706.773129][ T6913] ? dev_change_name+0xa70/0xa70 [ 1706.778049][ T6913] ? __dev_change_flags+0x510/0x6e0 [ 1706.783234][ T6913] ? dev_set_allmulti+0x30/0x30 [ 1706.788067][ T6913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.794287][ T6913] ? security_capable+0x95/0xc0 [ 1706.799379][ T6913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.805604][ T6913] dev_change_flags+0x10d/0x170 [ 1706.810462][ T6913] devinet_ioctl+0x1407/0x1c90 [ 1706.815215][ T6913] inet_ioctl+0x1f4/0x340 [ 1706.819527][ T6913] ? kfree+0x10a/0x2c0 [ 1706.823585][ T6913] ? tomoyo_path_number_perm+0x459/0x520 [ 1706.829198][ T6913] ? inet_dgram_connect+0x2d0/0x2d0 [ 1706.834376][ T6913] ? __x64_sys_ioctl+0x73/0xb0 [ 1706.839118][ T6913] ? do_syscall_64+0xfa/0x760 [ 1706.843775][ T6913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1706.849835][ T6913] ? debug_check_no_obj_freed+0x20a/0x43f [ 1706.855623][ T6913] ? __kasan_check_read+0x11/0x20 [ 1706.860628][ T6913] ? __kasan_check_write+0x14/0x20 [ 1706.865725][ T6913] ? lock_downgrade+0x920/0x920 [ 1706.870575][ T6913] ? rwlock_bug.part.0+0x90/0x90 [ 1706.875496][ T6913] ? debug_check_no_obj_freed+0xc0/0x43f [ 1706.881114][ T6913] packet_ioctl+0xb8/0x260 [ 1706.885516][ T6913] sock_do_ioctl+0xd8/0x2f0 [ 1706.890003][ T6913] ? compat_ifr_data_ioctl+0x160/0x160 [ 1706.895443][ T6913] ? trace_hardirqs_on+0x67/0x240 [ 1706.900457][ T6913] ? tomoyo_path_number_perm+0x459/0x520 [ 1706.906072][ T6913] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1706.912292][ T6913] ? tomoyo_path_number_perm+0x263/0x520 [ 1706.917912][ T6913] sock_ioctl+0x3ed/0x790 [ 1706.922234][ T6913] ? dlci_ioctl_set+0x40/0x40 [ 1706.926911][ T6913] ? __kasan_check_read+0x11/0x20 [ 1706.931920][ T6913] ? dlci_ioctl_set+0x40/0x40 [ 1706.936580][ T6913] do_vfs_ioctl+0xdb6/0x13e0 [ 1706.941152][ T6913] ? ioctl_preallocate+0x210/0x210 [ 1706.946260][ T6913] ? __fget+0x384/0x560 [ 1706.950402][ T6913] ? ksys_dup3+0x3e0/0x3e0 [ 1706.954805][ T6913] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1706.961036][ T6913] ? fput_many+0x12c/0x1a0 [ 1706.965483][ T6913] ? tomoyo_file_ioctl+0x23/0x30 [ 1706.970401][ T6913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1706.976622][ T6913] ? security_file_ioctl+0x8d/0xc0 [ 1706.981715][ T6913] ksys_ioctl+0xab/0xd0 [ 1706.985855][ T6913] __x64_sys_ioctl+0x73/0xb0 [ 1706.990427][ T6913] do_syscall_64+0xfa/0x760 [ 1706.994914][ T6913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1707.000786][ T6913] RIP: 0033:0x459829 [ 1707.004665][ T6913] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1707.024343][ T6913] RSP: 002b:00007fcbf7435c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:50:46 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020024260200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:46 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200003f0200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1707.032734][ T6913] RAX: ffffffffffffffda RBX: 00007fcbf7435c90 RCX: 0000000000459829 [ 1707.040683][ T6913] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000005 [ 1707.048636][ T6913] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1707.056586][ T6913] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf74366d4 [ 1707.064536][ T6913] R13: 00000000004c5635 R14: 00000000004d9c48 R15: 0000000000000007 03:50:47 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000c00002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000400200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000008cffffff040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x91, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x96) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x20010, r0, 0x180000000) [ 1707.228211][ T6913] bridge0: port 1(bridge_slave_0) entered blocking state [ 1707.235364][ T6913] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:47 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000001200002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-\\et\x00', 0x2, 0x0) 03:50:47 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000f00200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000f6ffffff040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000002000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000020200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000010000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-n%t\x00', 0x2, 0x0) [ 1707.536583][ T7067] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x80000001, 0x40000000100, 0x600000000000000, 0x5}]}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000180)={0xfff, 0x0, 0x301a, 0x9, 0x4, {0x3, 0x3f}, 0x1}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000280)=0x100000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) chroot(&(0x7f0000000240)='./file0\x00') [ 1707.618182][ T7067] bridge0: port 1(bridge_slave_0) entered blocking state [ 1707.625331][ T7067] bridge0: port 1(bridge_slave_0) entered forwarding state 03:50:47 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000003f00002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000020000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x2, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:47 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000060200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-n\\t\x00', 0x2, 0x0) 03:50:47 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000004000002080020000000000"], 0x1c, 0x2) 03:50:47 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x181601) flistxattr(r0, &(0x7f0000000080)=""/5, 0x5) read$rfkill(r0, &(0x7f0000000040), 0x8) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x6, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r1, 0x0, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x9, @media='udp\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x40) 03:50:48 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000020000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000c0200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1707.913439][ T7099] bridge0: port 1(bridge_slave_0) entered disabled state 03:50:48 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000ff00002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000004000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-ne/\x00', 0x2, 0x0) 03:50:48 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000120200000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 03:50:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x3, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:48 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000080000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000300000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000fff00002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-ne\\\x00', 0x2, 0x0) 03:50:48 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000100000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000020002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 4: munlockall() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x121800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001500)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000001580)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000014c0)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x9}], 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0/file0\x00', 0x103001, 0x1) sendmsg$nl_netfilter(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x408080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x1268, 0x13, 0xa, 0x500, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x2}, [@nested={0x1254, 0x3e, [@generic="265a175d1478d83a11dea18887565ab9a75138cc2c2f28ac2e57b03abbc98a4f51c6ddbb848f7ec8e56c9d3adf0728d74b4351440bb1f9567f389687681dc5f65fbcfb8518d2f1cf4e70a39abc22c53b4ee1b075010e642dd442554648f9fcad08880dd3be0b88de4de4ed408dc0c0c745658d9b4153aecf7c841a4aff42d50e0105bb3fb626b22a91d49f933eb03f09a9bc5817a7151ce66b738711b1e8d7bea34a2fda1c51742dd80fa2a7bcbeadfdae12513c4bf95aecc6e485a55a547db605d39a1dabe1dbebbc5b7fe2ad1dd45a4d73dfe37b6f14d7dbafe72013d308409a10d233b015a0290728ce282388c6b0e5", @generic="2461ea9c00be261b40f9004de4cee901f0a33a07101416f6ec9b393bf5435d1c27317c76216b15544832f90624c19f667db2f0b85412bfc74056a817025899666a69d8bcf091c6593aefcca7862eadf2ac4b077ad7b2714cadf5b6c0e60772", @generic="e22a7ed944a00207c7f0d0dd395b4215ba1fce45e6dc8f39dd6838bd071c14ba52fbd2c2eaf4d11f47cfb0af3a6722ef4fffd5ab10097aaefbd3cbc248e82196d17ace30fa4c4bf7573cb45316a0a0ee4ea484d1e31999c47bc0d91caa468f17d2a7d3522e1a0b58bca445155644738a36848be27b239e2af3013a73f418e035e2fe74b34fd443ade207b45528dd7c1dd5376418aecc8c9d6a2eede2c29561c34ddbad11890ce41b4c60abfe795168719dd9000295eddce37759eba5b86dd175f672", @typed={0x3c, 0x95, @str='keyring\'procwlan0vboxnet1cgroup%ppp1#selinuxuserkeyring\x00'}, @generic="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"]}]}, 0x627}, 0x1, 0x0, 0x0, 0x4000000}, 0x14) 03:50:48 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000500000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x10, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:48 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000200000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000012080020000000000"], 0x1c, 0x2) 03:50:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x02', 0x2, 0x0) 03:50:48 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000262400000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000022080020000000000"], 0x1c, 0x2) 03:50:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x2405, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x3b8, 0x10002}], 0x0, 0x0) 03:50:48 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000400000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000004000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x03', 0x2, 0x0) 03:50:49 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000042080020000000000"], 0x1c, 0x2) 03:50:49 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000200040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 4: 03:50:49 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000300000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x4c00, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:49 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000040040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x04', 0x2, 0x0) 03:50:49 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000062080020000000000"], 0x1c, 0x2) 03:50:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000100ffc, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0x401, 0x5, 0x1, 0x3, 0x9, 0xd8, 0xd35e, 0x20, 0x9, 0x100000001, 0x2727, 0x2, 0x83, 0x2, 0x10, 0x4}}) 03:50:49 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000500000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000c2080020000000000"], 0x1c, 0x2) 03:50:49 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000001000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000002040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x4c01, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x05', 0x2, 0x0) 03:50:49 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000200000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 4: 03:50:49 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000102080020000000000"], 0x1c, 0x2) 03:50:49 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002426000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000400000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5381, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x06', 0x2, 0x0) 03:50:49 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000122080020000000000"], 0x1c, 0x2) 03:50:49 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000202000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 03:50:49 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000003f2080020000000000"], 0x1c, 0x2) 03:50:49 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000020000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:49 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x10001, 0x4) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8080, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) ioctl$KDENABIO(r0, 0x4b36) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000780), &(0x7f00000007c0)=0x0, &(0x7f0000000800)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000840)=0xe8) r10 = getuid() fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f0000000a80)=0xc) getgroups(0x6, &(0x7f0000000ac0)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee01, 0xee00]) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001000)={0x0, 0x48, &(0x7f0000000f80)=[@in6={0xa, 0x4e22, 0x3e29, @loopback, 0x3}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x8, @remote, 0x293}]}, &(0x7f0000001040)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001080)={0x7fff, 0x8, 0x8208, 0xfff, 0x3, 0x2946, 0xffffffffffff0001, 0x5, r15}, &(0x7f00000010c0)=0x20) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000ec0)={{}, {0x1, 0x3}, [{0x2, 0x2, r2}, {0x2, 0x0, r3}, {0x2, 0x4, r4}, {0x2, 0x2, r5}, {0x2, 0x4, r6}, {0x2, 0x0, r7}, {0x2, 0x6, r8}, {0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x3, r11}], {0x4, 0x1}, [{0x8, 0x4, r12}, {0x8, 0x1, r13}, {0x8, 0x6, r14}, {0x8, 0x0, r16}, {0x8, 0x2, r17}, {0x8, 0x1, r18}, {0x8, 0x2, r19}, {0x8, 0x6, r20}, {0x8, 0x2, r21}], {0x10, 0x7}, {0x20, 0x3}}, 0xbc, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 03:50:49 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\a', 0x2, 0x0) 03:50:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5411, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:50 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000206000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000080000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000402080020000000000"], 0x1c, 0x2) 03:50:50 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000100000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\b', 0x2, 0x0) 03:50:50 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000ffffff8c2080020000000000"], 0x1c, 0x2) 03:50:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x541b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:50 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000001000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020c000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80100, 0xe3) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="873c3b33003222b52ade323c5d32e51684a9caf82cf05d4cd6b31b6a4e41168f76fe346a273f75d4d39fa9194811dee35d7c573d3b80c7ce0ed3a84649e7621e70771c3f89b748661b7ec43597a9e066319325acc4ed47d42921f99fc401af16927ce1b5a43183081c5d4e0dcf84c4bece5d4d66c9fe5b7dc47a96d39721ad6739a33d4cfc5c38a9994c92b8034f03584608d7b946e82b2a03b8226deaa4942f94dcf44db92f9fb0a4343719937d5c8ba4fa4b7c3dcb6d372ef11f431c205aac2f3c461bc0275f", 0xc7}, {&(0x7f0000000600)="4e0d75f6e525623157eff50d3865e8a794bd45c043948decfb7c5d8dd2af7b7cdf73afc90bb3735ef34df6dde32d8b621b2db0fdb757ad88fdadb40c73c02419042a3a68a34ba6bdd9146a0dc5e0c057856d187ab57939064f126bc441c8689d35df3e4ce1e3c279e22170707c9198537d13e8de3df0c258b6767d3fb4614d10dd57abea491c25914527d7e94d0f763b513f670e072217be4b", 0x99, 0xcaa}, {&(0x7f0000000180)="83c007d7d56e5a983d6b254dc64a7151e7d0c24642aa381fb26d63493a68392c618094accdf26b38e42aa40f3e61af0b15ae8fef36684425aff1df14f0ba2df558648e9e595ecfa8", 0x48, 0x1000}], 0x0, 0x0) 03:50:50 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000002000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:50 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000fffffff62080020000000000"], 0x1c, 0x2) 03:50:50 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000212000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5421, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:50 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000fffffffe2080020000000000"], 0x1c, 0x2) 03:50:50 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000004000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x40) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0/file0\x00', 0x1000) 03:50:50 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002f0000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:50 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000ff2080020000000000"], 0x1c, 0x2) 03:50:50 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200060000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000008000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5450, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:50 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x1, 0x0) open_tree(r0, &(0x7f0000000180)='./file0\x00', 0x1000) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:50 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000010000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:50 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000fff2080020000000000"], 0x1c, 0x2) 03:50:51 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000c0000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5451, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:51 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x24000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000001c00)="11dca5055e0bcfe47bf070") syz_mount_image$f2fs(&(0x7f0000000100)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:51 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040200000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200120000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000008cffffff2080020000000000"], 0x1c, 0x2) [ 1711.171528][ T7412] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1711.198531][ T7412] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 03:50:51 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040040000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000226240000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) [ 1711.214487][ T7412] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1711.234306][ T7412] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 03:50:51 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000f6ffffff2080020000000000"], 0x1c, 0x2) 03:50:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5452, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 03:50:51 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000224260000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000100000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000feffffff2080020000000000"], 0x1c, 0x2) 03:50:51 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002003f0000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:51 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000200000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5460, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:51 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000180020000000000"], 0x1c, 0x2) 03:50:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x26c, &(0x7f0000000040), 0x0, 0x0) 03:50:51 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000004000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:51 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000280020000000000"], 0x1c, 0x2) 03:50:51 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200400000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x5609, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:52 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:52 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004ffffff8c00000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200f00000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000480020000000000"], 0x1c, 0x2) 03:50:52 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004fffffff600000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002fffff000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000880020000000000"], 0x1c, 0x2) 03:50:52 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000048cffffff00000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:52 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000001000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x6364, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:52 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000001080020000000000"], 0x1c, 0x2) 03:50:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xbda6, 0x4, &(0x7f0000000240)=[{&(0x7f0000000900)="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", 0x1000, 0xf83e}, {&(0x7f0000000080)}, {&(0x7f00000000c0)="4ae1470289491b7414ae4599355c3c03819b4ba8d8fc126b303960f58e81274a87514ab8b38be5adb2b959200fbe8000e1b839", 0x33, 0x2}, {&(0x7f0000000180)="dccec8a2577c47f13123f40f66bd7156645a7ef1609d1a321556283bfee0ea9674670f9b8f816d8fa9c8015ca0ba7338ed0bad202a6846c8d8bf2b82a1b09409932e08f7150ea9adc7742f621cb584b701d81d9bf7b745578edf5db4903da348a1c63a9e297b4c", 0x67, 0x10001}], 0x10000, &(0x7f00000004c0)={[{@shortname_lower='shortname=lower'}, {@numtail='nonumtail=0'}, {@uni_xlateno='uni_xlate=0'}, {@fat=@check_relaxed='check=relaxed'}, {@shortname_win95='shortname=win95'}, {@fat=@errors_continue='errors=continue'}, {@utf8no='utf8=0'}], [{@fowner_gt={'fowner>', r0}}, {@fowner_gt={'fowner>', r1}}, {@permit_directio='permit_directio'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) 03:50:52 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004f6ffffff00000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000002000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000200002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x6609, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1712.519581][ T7545] FAT-fs (loop4): Unrecognized mount option "fowner>00000000000000000000" or missing value 03:50:52 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040002000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000040)={0x6, "ed35d258e8c41958176bfc0733bd7da74e3213a419b4da1abf34888a443c41eb", 0x7, 0x0, 0x8000, 0x5, 0x0, 0x2, 0x0, 0x5}) 03:50:52 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000400002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000006000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000400000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000600002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000000c000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8901, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:52 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000001000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:52 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000012000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x1c9c380}, 0x3, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0xf, 0x4) 03:50:53 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200002624000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000002000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000c00002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8902, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:53 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000003f000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000040000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000001000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:53 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400ffffff8c000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) getgroups(0x4, &(0x7f0000000480)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) r4 = getegid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x2}, [{0x2, 0x6, r0}, {0x2, 0x7, r1}], {0x4, 0x3}, [{0x8, 0x4, r2}, {0x8, 0x7, r3}, {0x8, 0x2, r4}]}, 0x4c, 0x1) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x20582) symlinkat(&(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000080)='./file0/file0\x00') 03:50:53 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000040000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000001200002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8903, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:53 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400fffffff6000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002fffffff6000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:53 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000006002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x5f, 0x100000001, 0x1ff}) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000080)="1b9d08d4c225ffc69a7c8414ba151ef659a2209fed83af1d417d83c4648ff7eb38183935ee617a8faef8ceccd794") bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 03:50:53 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004008cffffff000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002fffffffe000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000c002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x101041, 0x0) fspick(r0, &(0x7f0000000040)='./file0\x00', 0x1) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000180)={0xa, 0x9, 0x42, 0x3}, 0xa) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x5, 0x400000) getsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000001c0), &(0x7f0000000240)=0x4) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c5602027fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a081000418e00000004fcff", 0x58}], 0x1) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000080)=']nodev\x00', 0x7) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) syz_mount_image$btrfs(&(0x7f0000000340)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000300)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) write$capi20(r0, &(0x7f0000000280)={0x10, 0x7, 0x87, 0x82, 0x8, 0x9}, 0x10) 03:50:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8904, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:53 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400f6ffffff000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:54 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000012002080020000000000"], 0x1c, 0x2) 03:50:54 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200f0ffff000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:54 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000020000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:54 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002f6ffffff000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8905, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:54 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000020002080020000000000"], 0x1c, 0x2) 03:50:54 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000004000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:54 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000008c0)="8da4363ac0ed00000000000000000000000000009748aeb81e1b00920efd9a0000010000000000000000", 0x33, 0x10000}], 0xfffffffffffffffe, 0x0) 03:50:55 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002feffffff000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000010020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000003f002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8906, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000040002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000020020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000100000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000400020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) 03:50:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8907, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:55 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000000400000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000ff002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000ffffff8c0020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000fff002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200020000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000fffffff60020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 03:50:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8908, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\xff', 0x2, 0x0) 03:50:55 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000003f80020000000000"], 0x1c, 0x2) 03:50:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400008cffffff0020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200060000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000f6ffffff0020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8909, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f00000001c0)) 03:50:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000005880020000000000"], 0x1c, 0x2) 03:50:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:56 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000c0000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000060000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000002002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200120000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c00000014000502000000000000000002000000", @ANYRES32=r1, @ANYBLOB="14000200fe060000000000000000000073dca9b4"], 0x2c}}, 0x0) 03:50:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000200000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x890a, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1716.186523][ T7858] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 03:50:56 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200f00000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000040000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000004002080020000000000"], 0x1c, 0x2) [ 1716.237064][ T7867] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 03:50:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\xf6', 0x2, 0x0) 03:50:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x890b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000006002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000120000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000600000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000220000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000c002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:56 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000c00000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x890c, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:56 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000010002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000004020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200001200000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004000000ffffff8c20000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x890d, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000009b80)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000840)="0172464c10f5ac361f448406118492f7d124e13c11a40b3320a855740854e5ec5d6a892c9589ef601e5d6e0a282788dec032c2c01071b3314dff75fe17054d11a910747b4a10705bca6090ce54b6806f2c7bbdd18e11a070ea751482356a6c93efd9ab492b5f1c5cd4", 0x69}], 0x1}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000cc0)="655518fd57b8a13accea15714489a64acc7145b7eec0cdc2f482e17921723f94519c87380d9b28ed78b03d1e5cf7d1961e74cfe10c1248c03088b9244bd59fcddddc911c4566b0671b8dce92d3808875730e3cb7c4728b30ed517749427c6b4da91e50512061f429ea74f934d0a81e586305ac7f9ef1864c49969fef86bc2af753ab8361d3a0ba48f5225b821d66b288932542bb8cf1df07a762d93bab1bfaed83b5ab2a9b04c63f4b39f3b181c13aa150f75b8fd9d4ba375550874bcf71db03329de81864066712d7c955a98f6e0a6d", 0xd0}], 0x1}}, {{0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000003580)="b5039fff5d03a4eff30f29e42f06f1c57d8b1b73fe5493a73a280e68f2df32a3cd2ed2186717b2f49e3de15486ffa0e132f2da5b0fb378fd5c11cc2604057217266b39c54302a4e9b3265690d65168d5ca45267604040900709d5b7e30384ae6a825b6c5b65a200650", 0x2b5}], 0x1}}, {{0x0, 0x0, &(0x7f0000003ac0)=[{&(0x7f0000003a80)="05", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000005200)=[{&(0x7f0000003cc0)="350726127ad9abb67dd4ec8ede263c1bf507df9753121a9c202af92dfe3ac9abfe7a232e6116caf15e94701c573bc84980f10c3116c12fcc2385cd0a8fd6f761c1c258475dc9291a2b31b034a2e31a26be58749e1cef9ed1", 0x58}, {&(0x7f0000003e00)="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", 0x721}], 0x2}}], 0x5, 0x40090) 03:50:57 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200262400000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004000000fffffff620000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000012002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200242600000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000062080020000000000"], 0x1c, 0x2) 03:50:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000008cffffff20000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8912, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ptrace$pokeuser(0x6, 0x0, 0xf8c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:57 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200003f00000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000c2080020000000000"], 0x1c, 0x2) 03:50:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004000000f6ffffff20000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200004000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000122080020000000000"], 0x1c, 0x2) 03:50:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ptrace$pokeuser(0x6, 0x0, 0xf8c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8915, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000001000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000f000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000202080020000000000"], 0x1c, 0x2) 03:50:57 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000003f2080020000000000"], 0x1c, 0x2) 03:50:57 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200fffff0000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000002000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8916, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ptrace$pokeuser(0x6, 0x0, 0xf8c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:58 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000010000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000402080020000000000"], 0x1c, 0x2) 03:50:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000004000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000020000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000ff2080020000000000"], 0x1c, 0x2) 03:50:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000008000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8917, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000fff2080020000000000"], 0x1c, 0x2) 03:50:58 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000060000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ptrace$pokeuser(0x6, 0x0, 0xf8c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000010000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8918, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000002000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000022080020000000000"], 0x1c, 0x2) 03:50:58 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000000c0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ptrace$pokeuser(0x6, 0x0, 0xf8c, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8919, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000400020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000042080020000000000"], 0x1c, 0x2) 03:50:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ptrace$pokeuser(0x6, 0x0, 0xf8c, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:58 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000020020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000120000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) ptrace$pokeuser(0x6, 0x0, 0xf8c, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:58 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000062080020000000000"], 0x1c, 0x2) 03:50:59 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000026240000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000004020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x891a, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000c2080020000000000"], 0x1c, 0x2) 03:50:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:59 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000003f0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000060000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000102080020000000000"], 0x1c, 0x2) 03:50:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x891b, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000220000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000400000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000122080020000000000"], 0x1c, 0x2) 03:50:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000060000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:59 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200fffffff60000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x891c, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000002000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000003f80020000000000"], 0x1c, 0x2) 03:50:59 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200fffffffe0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:50:59 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000004000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:50:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8924, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:50:59 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000005880020000000000"], 0x1c, 0x2) 03:50:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:50:59 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000f0ffff0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000008000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200f6ffffff0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000280020000000000"], 0x1c, 0x2) 03:51:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8925, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:51:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000010000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000480020000000000"], 0x1c, 0x2) 03:51:00 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200feffffff0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020020000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000200000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000000880020000000000"], 0x1c, 0x2) 03:51:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x0) 03:51:00 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020004000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000600000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000001080020000000000"], 0x1c, 0x2) 03:51:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8934, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000c00000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000005880020000000000"], 0x1c, 0x2) 03:51:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x3, 0x0) 03:51:00 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200001200000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8935, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:00 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:00 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080030000000000"], 0x1c, 0x2) 03:51:00 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:00 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000f000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x5, 0x0) 03:51:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800f0000000000"], 0x1c, 0x2) 03:51:01 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000006000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:01 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020ffffff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8940, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080100000000000"], 0x1c, 0x2) 03:51:01 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000000c000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020200000000"], 0x1c, 0x2) 03:51:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x6, 0x0) 03:51:01 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000012000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8941, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:01 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020ffffff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020400000000"], 0x1c, 0x2) 03:51:01 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200002624000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400000000000000208cffff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x8, 0x0) 03:51:01 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200002426000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020600000000"], 0x1c, 0x2) 03:51:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x894c, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:01 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020f6ffff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:01 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000003f000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:01 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020c00000000"], 0x1c, 0x2) 03:51:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0xe, 0x0) 03:51:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000040000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x894e, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080021000000000"], 0x1c, 0x2) 03:51:02 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000f0000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8950, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x10, 0x0) 03:51:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080021200000000"], 0x1c, 0x2) 03:51:02 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000fffff00000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020006000000"], 0x1c, 0x2) 03:51:02 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000100040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8953, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x2) 03:51:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000c000000"], 0x1c, 0x2) 03:51:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:02 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000200040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000600040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020012000000"], 0x1c, 0x2) 03:51:02 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8955, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:02 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000c00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x3) 03:51:02 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020020000000"], 0x1c, 0x2) 03:51:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8980, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002003f000000"], 0x1c, 0x2) 03:51:03 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000001200040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000200", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x4) 03:51:03 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000262400040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020040000000"], 0x1c, 0x2) 03:51:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000040", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:03 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000003f00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8981, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200ff000000"], 0x1c, 0x2) 03:51:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x5) 03:51:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:03 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000004000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020fff000000"], 0x1c, 0x2) 03:51:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8982, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000fffffff600040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000200000"], 0x1c, 0x2) 03:51:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:03 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000fffffffe00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x6) 03:51:03 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8983, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:03 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000100"], 0x1c, 0x2) 03:51:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004000000000000002000ffff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000f0ffff00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000200"], 0x1c, 0x2) 03:51:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x7) 03:51:04 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000f6ffffff00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a0, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004000000000000002000ffff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000400"], 0x1c, 0x2) 03:51:04 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000feffffff00040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020008cff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x8) 03:51:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000600"], 0x1c, 0x2) 03:51:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004000000000000002000f6ff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000002000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a1, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000c00"], 0x1c, 0x2) 03:51:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:04 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000006000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0xae01, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x300) 03:51:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000001000"], 0x1c, 0x2) 03:51:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:04 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000000c000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:04 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000001200"], 0x1c, 0x2) 03:51:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:51:05 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000012000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x500) 03:51:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000003f00"], 0x1c, 0x2) 03:51:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0xae41, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:05 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000f0000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, 0x0, 0x0, 0x0) 03:51:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000004000"], 0x1c, 0x2) 03:51:05 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000060000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, 0x0, 0x0, 0x0) 03:51:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000000c0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002ffffff8c00"], 0x1c, 0x2) 03:51:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x600) 03:51:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, 0x0, 0x0, 0x0) 03:51:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0xae60, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002fffffff600"], 0x1c, 0x2) 03:51:05 executing program 4: sched_setattr(0x0, &(0x7f0000000280), 0x0) 03:51:05 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000120000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x700) 03:51:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000002", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0xae80, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\xecJ\x00z5\xc2\x00'}) 03:51:05 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000026240000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002fffffffe00"], 0x1c, 0x2) 03:51:05 executing program 4: 03:51:05 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000024260000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002000000ff00"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x4000) 03:51:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000003f0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000fff00"], 0x1c, 0x2) 03:51:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000400000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x40045532, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080028cffffff00"], 0x1c, 0x2) 03:51:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0xff00) 03:51:06 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000f00000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002f6ffffff00"], 0x1c, 0x2) 03:51:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400000000000000200000ff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000fffff000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="1000000000000000208002feffffff00"], 0x1c, 0x2) 03:51:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x40049409, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400000000000000200000ff", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x1000000) 03:51:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000001040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000200000000000000004000000000000002000008c", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x40081271, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:06 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000002040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 4: 03:51:06 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:06 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000020000000000000000400000000000000200000f6", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x2000000) 03:51:07 executing program 4: 03:51:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000006040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 4: 03:51:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x40086602, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:07 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x3000000) 03:51:07 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000000000000c040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 4: 03:51:07 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 4: socket$kcm(0x11, 0x3, 0x300) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240), 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 03:51:07 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000012040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x401054d5, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x4000000) [ 1727.513677][ T9169] device nr0 entered promiscuous mode 03:51:07 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000002624040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000020000000000003f040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:07 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) [ 1727.831672][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1727.837465][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1727.850176][ T9169] device nr0 entered promiscuous mode 03:51:08 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x505ac0}], 0x1}, 0x0) 03:51:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x4020940d, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:08 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:08 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000000040040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:08 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x5000000) 03:51:08 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:08 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000fffffff6040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:08 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08020000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:08 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:08 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000fffffffe040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x4020ae46, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:08 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08004000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000200)="d32edd93345f1db780cafe7384239d4dfb652c50218ea7c59c54589f441032dcded670f40da9b72a87e4d4e3eef09da1b45357b408e87caa8c4de88c41123e0b1a81eacfe66c4290bfbd14c350a0aa4826d5a74091"}, 0x10) r3 = socket$kcm(0x11, 0x2, 0x300) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r3) socket$kcm(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0xfe, 0x40, 0x2, 0x8, 0x0, 0x0, 0x4100, 0x0, 0x401, 0x0, 0xfa, 0x8, 0x5, 0x8, 0x0, 0x0, 0x3, 0x100000000, 0x0, 0x0, 0x2, 0x0, 0x6, 0x3, 0x1, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd0a8, 0x0, 0x0, 0x4, 0x0, 0x201a, 0x1, @perf_bp={0x0, 0xa}, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x9, 0x100000001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x8, 0x7, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x10200, 0x0, 0x0, 0x1, 0x1000, 0x0, 0x5, 0x2, 0xff, 0x0, 0x4, 0x0, 0x50, 0x0, 0x9, 0x1, 0x0, 0x1, 0x8, 0x0, 0x3, 0xbd4b, 0xebf, 0x0, 0x6, 0x0, 0x4, 0x29e, 0x0, 0x2, 0x0, 0x9, 0x0, @perf_config_ext={0xc32}, 0x20, 0x0, 0x2, 0x0, 0x0, 0x1, 0xff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0xc008240a, 0x0) 03:51:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x6000000) 03:51:09 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000f0ffff040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000ff"], 0x1c, 0x2) 03:51:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000200e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x4024700a, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:09 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000ff"], 0x1c, 0x2) 03:51:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000040e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000f6ffffff040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000002e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x4090ae82, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x7000000) [ 1729.153510][ T9259] device nr0 entered promiscuous mode 03:51:09 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000feffffff040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000ff"], 0x1c, 0x2) 03:51:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09075e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x800448f0, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 03:51:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x8000000) 03:51:09 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000020000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab029b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 03:51:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x800454d2, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:09 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0x40000000) 03:51:09 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab049b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000200000000060000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:09 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:10 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 03:51:10 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="100000000000000020800200000000ff"], 0x1c, 0x2) 03:51:10 executing program 1: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000002000000000c0000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:10 executing program 0: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000002000000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab089b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020000000000"], 0x1c, 0x2) 03:51:10 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 03:51:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r4 = socket$inet6(0xa, 0x803, 0x20) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x80086301, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:51:10 executing program 5: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020000000", @ANYRES32, @ANYBLOB="08000000e27790f5f956cd5dcbb7fbded85d09f85e7aec2ae1b09d5cab209b4a8ce60f3e42f6454a33d850c4e060927fb7cae3966b0960f6213e18b42f2b9dfe1971e04dddd75effbc1970e635f2ea713bd3d72829bed50e1fc5ce4871e0c5573f9f06a872590b66191a013685d98d12593b51019422f59663b3eae72506dfba6a8b01da26633acb9c6b00", @ANYRES32=0x0, @ANYBLOB="10000000000000002080020002000000"], 0x1c, 0x2) 03:51:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x800000000000002, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-net\x00', 0x2, 0xf6ffffff) [ 1730.222884][ T9341] ------------[ cut here ]------------ [ 1730.228508][ T9341] ODEBUG: free active (active state 0) object type: work_struct hint: smc_tx_work+0x0/0x1d0 [ 1730.239119][ T9341] WARNING: CPU: 0 PID: 9341 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 1730.248578][ T9341] Kernel panic - not syncing: panic_on_warn set ... [ 1730.255259][ T9341] CPU: 0 PID: 9341 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190802 #58 [ 1730.261154][ T3877] kobject: 'loop3' (000000008f020307): kobject_uevent_env [ 1730.264431][ T9341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.264436][ T9341] Call Trace: [ 1730.264455][ T9341] dump_stack+0x172/0x1f0 [ 1730.264471][ T9341] ? debug_print_object+0xc0/0x250 [ 1730.264488][ T9341] panic+0x2dc/0x755 [ 1730.284487][ T3877] kobject: 'loop3' (000000008f020307): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1730.285002][ T9341] ? add_taint.cold+0x16/0x16 [ 1730.285021][ T9341] ? __kasan_check_write+0x14/0x20 [ 1730.318487][ T9341] ? __warn.cold+0x5/0x4c [ 1730.322813][ T9341] ? __warn+0xe7/0x1e0 [ 1730.326893][ T9341] ? debug_print_object+0x168/0x250 [ 1730.332178][ T9341] __warn.cold+0x20/0x4c [ 1730.336413][ T9341] ? debug_print_object+0x168/0x250 [ 1730.341628][ T9341] report_bug+0x263/0x2b0 [ 1730.346139][ T9341] do_error_trap+0x11b/0x200 [ 1730.350839][ T9341] do_invalid_op+0x37/0x50 [ 1730.355260][ T9341] ? debug_print_object+0x168/0x250 [ 1730.360454][ T9341] invalid_op+0x23/0x30 [ 1730.364605][ T9341] RIP: 0010:debug_print_object+0x168/0x250 [ 1730.370405][ T9341] Code: dd 40 5a c6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 40 5a c6 87 48 c7 c7 40 4f c6 87 e8 b0 28 05 fe <0f> 0b 83 05 23 e3 67 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 1730.390462][ T9341] RSP: 0018:ffff88808ac97bb8 EFLAGS: 00010082 [ 1730.396521][ T9341] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1730.404589][ T9341] RDX: 0000000000000000 RSI: ffffffff815bbfc6 RDI: ffffed1011592f69 [ 1730.413019][ T9341] RBP: ffff88808ac97bf8 R08: ffff88805c5aa540 R09: ffffed1015d04101 [ 1730.421069][ T9341] R10: ffffed1015d04100 R11: ffff8880ae820807 R12: 0000000000000001 [ 1730.429120][ T9341] R13: ffffffff88d787e0 R14: ffffffff8149ee90 R15: ffff8880a799b230 [ 1730.437092][ T9341] ? __exit_umh+0x2e0/0x2e0 [ 1730.441599][ T9341] ? vprintk_func+0x86/0x189 [ 1730.446357][ T9341] ? debug_print_object+0x168/0x250 [ 1730.451688][ T9341] debug_check_no_obj_freed+0x2d4/0x43f [ 1730.457317][ T9341] kmem_cache_free+0x18f/0x320 [ 1730.462117][ T9341] __sk_destruct+0x4bc/0x6e0 [ 1730.466701][ T9341] sk_destruct+0x86/0xa0 [ 1730.470931][ T9341] __sk_free+0xfb/0x360 [ 1730.475103][ T9341] sk_free+0x42/0x50 [ 1730.479078][ T9341] smc_release+0x2f6/0x380 [ 1730.483495][ T9341] __sock_release+0xce/0x280 [ 1730.488088][ T9341] sock_close+0x1e/0x30 [ 1730.492251][ T9341] __fput+0x2ff/0x890 [ 1730.496661][ T9341] ? __sock_release+0x280/0x280 [ 1730.501504][ T9341] ____fput+0x16/0x20 [ 1730.505478][ T9341] task_work_run+0x145/0x1c0 [ 1730.510152][ T9341] exit_to_usermode_loop+0x316/0x380 [ 1730.515515][ T9341] do_syscall_64+0x65f/0x760 [ 1730.520096][ T9341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1730.525987][ T9341] RIP: 0033:0x413511 [ 1730.529873][ T9341] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1730.549732][ T9341] RSP: 002b:00007ffe9521e390 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1730.558147][ T9341] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 1730.566113][ T9341] RDX: 0000001b32820000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1730.574077][ T9341] RBP: 0000000000000001 R08: ffffffff8129007e R09: 00000000832f90d9 [ 1730.582089][ T9341] R10: 00007ffe9521e470 R11: 0000000000000293 R12: 000000000075bf20 [ 1730.590053][ T9341] R13: 00000000001a6698 R14: 00000000007602a0 R15: ffffffffffffffff [ 1730.598134][ T9341] ? fpregs_assert_state_consistent+0xe/0xf0 [ 1730.605698][ T9341] Kernel Offset: disabled [ 1730.610207][ T9341] Rebooting in 86400 seconds..