0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:05 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(r0, &(0x7f00000004c0)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xc6\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\x00\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00|l\x18\x9a\xdc\x818\x0e\x94\x99\xb9*J2\xfa\x9c\x04\xfc\x9c\"\x8a>\xd7>}\x92\xf5\xb12\xcb\xc8x5\xb3\xb2\xa9\xd9\x85\x82\xe4F\xaa\xd0\xf9\x1bq\x03\x97\xaf\x11\x8b\xa1\x12\x19=\x8d\x1a\xd1\x1f\x92\xa9\xd3\xd3\\m$t\xf3\x908\x1c\x18\xde\x97\xb4\b>/G\x98\xbbI\xcb\x10VC\xabA\xf9\f9\xf4-da\xf8+BES5r\xb2t\xfff2\xd8y\xb3D#\xa4\xc2\x15\xc7\xfa\x8e\x9a\xa7\'\x83\xdd\xb2n92\b\"2zI#\xbc\x1b\x18\xe3\x9cn\xf5\xd4', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) 13:19:05 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00), 0x400034b, 0x0) 13:19:05 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) chdir(&(0x7f0000000000)='./bus\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) [ 272.688695][T16463] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000000000)="3c20a12e5782a9238902aaad72e5f616e2bfb8be55de5d92df7da0b1c0cee6d4432146517da0409a288c04f57eddef3bc38f5b3328cbb36cd2acc690c51775453eb5f4400a9515ca5cfb033fd8e074fd18628eb5e862b2357dfe273e2c06a124ee2f065aaa0615067faf6795", 0x6c}, {&(0x7f00000000c0)="269f5f551d77eff66666665abcab24e1235824dfb9d1f88722f5538e923dd1b802d1b7bbac94721dcf53f4db3c86694ee5b739b8eedce4af988e7f8d514ae2c21c319a97244610955494f5214fff0b592de7cc6897057c4110fad9abfaffe3ddfc70d93b2a3ac16627e3813c2c7e1694fce85acc3b997649b2b150171132c332de90b8284618e48e16b462aa68a746734663a4cd04dfd89ac6caf3dfc9c43a5b93bf498a27cdd0f6bb18a402b530ce901c838bfc5ffd086c798103f203506fe0e60bde6715d4a1419e7c61170dabfde51d47e0f82ca1ce8bf03c6e33bb3418d18530196a29", 0xe5}, {&(0x7f00000001c0)="7cb17902061273fbc4d9bbe5d6526fc6e04b21694cb5d22b45afce90582bf9eb0578391842259d4481d9436891dd5c6359972a5387268f66b2af0cd6aea34643343f4fcf52c592f70fb46fb345d0fb01715000f1dfe5c3e6bbfe51163a27ea794851b8cac04be7e6beb95324d6fc848e284a4628ed1777400de091a6ee19eac3ece0f4f41dfd9693ee8811eb5467c7dc3746762a1000db84b970dbea0558b155e166b98e4759ca7f7baaa00e6cf159dd9b50a98f0ecaa071b68bb7da40b654d800f9a26c920de7de1da8874318c174f77a98cb123be838f0c297ccaeb87b16eb08e877d8f29359ec51641b10", 0xec}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f00000002c0)="002d66e05d4e213a14512acdb91ff43f8cd48f0a766c94b10b02cfa2aaf30b9edd54a14a1b69919dcd3d235f5ee22e60cb890b83d7c8be6bd4c6b0607099ed143f1167dea2e6d6ae5429c14926eb486d3a9425ea8d822517d12ce7bce7956807a56e5ecf385eb3277b9bd8a02b49faf1493494593827ec86cdc2c7c76a990131442faa453d7f3eefa0c712ebd2bc0f82be880b83fee78f8efdec40e392d84c9dce8991f1f2c5d0c0381e89fac1b598387621a5eec2173af462dd11778956116f98c06fb9614bd9f29374ff101e8ea748e5a63796e4f53321a8", 0xd9}, {&(0x7f00000003c0)="0973e2eb", 0x4}, {&(0x7f0000000400)="e5ff4073c34bc2ed59a0059f226915345a17ea56076ddcc792b67a4ee53be978a88a7e248776bfba2c86822e44dc47ba5bbecc068ec3ca9d18fbdb36b3fd85741292a5f8d8827d722367725a04161495b2e61b9c216b2a2b5ac71d014fa0565a2a5ba0351a6390103fdd922b7e1141567edc87f8ef9cf402030075adf87a517e388fb79fb13833584c4d8fd225ed61", 0x8f}, {&(0x7f00000004c0)="7855ef2590657f87017b66d3", 0xc}], 0x8, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000580)={0xff, @rand_addr=0xffffffff, 0x4e24, 0x3, 'sed\x00', 0x10, 0x7ff, 0x7a}, 0x2c) 13:19:06 executing program 4: socket$inet(0x2, 0x803, 0x80000000007c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x100, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000180)={0x7}) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x100) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000), 0x4) r2 = shmget$private(0x0, 0x3000, 0x223, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r2, 0xb) syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7fffffff, 0x80003) 13:19:06 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) [ 273.042511][T16562] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:08 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:08 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200080, 0x0) openat$cgroup_ro(r0, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) 13:19:08 executing program 3: setreuid(0x0, 0xee00) r0 = getuid() stat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./bus\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="d94005066ed8b3e87bcc60e251592524a90ecbb94785681361bd06aba3d6a7fc19196fcff55b558ce1de4d7f4fd5faced992bcbc21749d21e8d4cf8666d9017d3c2224d84714fbad1dab9af632c843a6bac4055413a3a419f21cbb081897846b79182fdaa3169bd75c0e45d156", 0x6d, 0xfffffffffffffffc}, {&(0x7f0000000180)="39b085183ba7fb343571b63da6f5a8a94843847409a8811e11b23b3964769f7639702b1b120bfb5d74d67fbd24e7d92dbd74eb9d42944631bc8157e225e30a35ae8e4313168ee0c12e66a7080fd9b579a945bf452a8fa920d8466447ba7961c1f867d498f4f2661829628a2f981d794bce6df49c07b69804fab0724d0192f720df3de974ae498e3bc0aa25af4db69b6e67c6ce68803265d5d9d5c93e163c2a483d2306b0101ddd", 0xa7, 0x9}], 0x1000000, &(0x7f0000000340)={[{@sysvgroups='sysvgroups'}, {@logdev={'logdev', 0x3d, './bus'}}, {@rtdev={'rtdev', 0x3d, './bus'}}, {@quota='quota'}, {@attr2='attr2'}], [{@uid_lt={'uid<', r0}}, {@smackfsroot={'smackfsroot', 0x3d, '@keyringmd5sum'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':%(.],::}GPL**++}'}}, {@fowner_lt={'fowner<', r1}}, {@subj_user={'subj_user', 0x3d, '}selinux'}}, {@obj_type={'obj_type'}}, {@fsname={'fsname'}}, {@obj_role={'obj_role', 0x3d, '}\''}}, {@dont_appraise='dont_appraise'}, {@subj_role={'subj_role', 0x3d, '%trusted-cgroupposix_acl_access'}}]}) r2 = geteuid() setreuid(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x80, 0x10) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r2, r2) clone(0x4000800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:08 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00), 0x400034b, 0x0) 13:19:08 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x6, 0x4, 0x3, 0x7, 'syz0\x00', 0x10001}) [ 275.530716][T16606] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:08 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x121000, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7, 0x1b, 0x1}, 0x7) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) sendto$netrom(r0, &(0x7f0000000280)="1e66b48f1ebefeabaaa40104a8de8ff7fb6b296b86ddd69262cec102a2f8df12aced9dbebdc9b7f21c8092b1592d963ffe1a6cff17ca1251d4717e8f0107b62aeee756", 0x43, 0x8000, &(0x7f0000000300)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @default]}, 0x48) read(r0, &(0x7f0000000100)=""/164, 0xa4) setreuid(r1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./bus\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000240)={0xffffffff, 0x7, 0x6}, 0xc) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='./bus\x00', r0) 13:19:09 executing program 5: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:klogd_var_run_t:s0\x00', 0x25, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) [ 275.844689][T16727] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 277.337878][T11562] device bridge_slave_1 left promiscuous mode [ 277.344066][T11562] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.397874][T11562] device bridge_slave_0 left promiscuous mode [ 277.404109][T11562] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.387409][T11562] device hsr_slave_0 left promiscuous mode [ 278.427031][T11562] device hsr_slave_1 left promiscuous mode [ 278.493855][T11562] team0 (unregistering): Port device team_slave_1 removed [ 278.505244][T11562] team0 (unregistering): Port device team_slave_0 removed [ 278.515761][T11562] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 13:19:11 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xc1bd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @sack_perm, @mss={0x2, 0x30000}, @timestamp, @sack_perm], 0x5) setsockopt$inet6_buf(r1, 0x29, 0x22, 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) 13:19:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:11 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00), 0x400034b, 0x0) 13:19:11 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) setreuid(0x0, r0) mknod(&(0x7f0000000080)='./bus\x00', 0x8080, 0x5) r2 = geteuid() setreuid(r0, 0x0) fcntl$setstatus(r1, 0x4, 0x400) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x581200, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8001, 0x10000) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xd) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0xa41, 0x0) 13:19:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 278.559818][T11562] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 13:19:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x7b8815392cb1043a}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x30, 0x0, @in={0x2, 0x4e24, @multicast1}}}, 0xa0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) [ 278.787735][T11562] bond0 (unregistering): Released all slaves 13:19:12 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x9e, "b9da0867ff9a1a24979690a54513d63a83a0861043ab0521fef27d97e3c7b0fb8cbaa34022a68083b86f799dc09dd5ae88d9c1a654749809faf443da0c0cc9fb838a4911ef3ff9dc84cc49769d7467565f423a25b7c63daca8142567dfd0002dfb616394153df3a6187a310d7b0ff262adb034465dc37d9c1a3d18def769b6674c395666ea76d9a7b56733a9667d389665f1f53e38b93d3c55c24c9ed24a"}, &(0x7f0000000040)=0xa6) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r2, 0x5, 0x9, 0x5, 0x2, 0x1000}, &(0x7f00000001c0)=0x14) 13:19:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x100000000, 0xfffffffffffffffa, 0x1, 0x57, 0x45df, 0x81}) 13:19:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 279.097058][T16977] EXT4-fs warning (device sda1): ext4_group_add:1644: No reserved GDT blocks, can't resize [ 280.506198][T16988] IPVS: ftp: loaded support on port[0] = 21 [ 280.564391][T16988] chnl_net:caif_netlink_parms(): no params data found [ 280.588922][T16988] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.596529][T16988] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.604250][T16988] device bridge_slave_0 entered promiscuous mode [ 280.611764][T16988] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.618931][T16988] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.626481][T16988] device bridge_slave_1 entered promiscuous mode [ 280.643471][T16988] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 280.654201][T16988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.673708][T16988] team0: Port device team_slave_0 added [ 280.680760][T16988] team0: Port device team_slave_1 added [ 280.738920][T16988] device hsr_slave_0 entered promiscuous mode [ 280.787262][T16988] device hsr_slave_1 entered promiscuous mode [ 280.817190][T16988] debugfs: Directory 'hsr0' with parent '/' already present! [ 280.832845][T16988] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.839925][T16988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.847323][T16988] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.854372][T16988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.883036][T16988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 280.895720][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.904115][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.911857][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.920108][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 280.932288][T16988] 8021q: adding VLAN 0 to HW filter on device team0 [ 280.941893][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.950321][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.957415][T10224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.968888][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.977380][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.984425][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.999673][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.008533][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 281.024693][T16988] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 281.035380][T16988] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 281.049345][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.058051][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.067032][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.075757][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 281.093592][T16988] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 281.189359][T16996] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:14 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:14 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xffffffffffffff7f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0x8}, 0x8) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000140)={'bridge_slave_0\x00', 0x3347, 0x7fff}) 13:19:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) fcntl$dupfd(r0, 0x406, r0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', r2}) 13:19:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:15 executing program 5: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) 13:19:15 executing program 3: setreuid(0x0, 0xee00) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x111200, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x49, 0x2000) renameat(r0, &(0x7f0000000040)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00') r2 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 13:19:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:15 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 282.225123][T17031] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted [ 282.309015][T17031] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted 13:19:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000900)="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", 0x1000}], 0x1, 0x4) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x10000) [ 283.148620][ T29] device bridge_slave_1 left promiscuous mode [ 283.154820][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.207825][ T29] device bridge_slave_0 left promiscuous mode [ 283.213980][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.007361][ T29] device hsr_slave_0 left promiscuous mode [ 284.067083][ T29] device hsr_slave_1 left promiscuous mode [ 284.113418][ T29] team0 (unregistering): Port device team_slave_1 removed [ 284.124540][ T29] team0 (unregistering): Port device team_slave_0 removed [ 284.134397][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 284.170849][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 284.258944][ T29] bond0 (unregistering): Released all slaves [ 284.362104][T17163] IPVS: ftp: loaded support on port[0] = 21 [ 284.417995][T17163] chnl_net:caif_netlink_parms(): no params data found [ 284.445542][T17163] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.452759][T17163] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.460478][T17163] device bridge_slave_0 entered promiscuous mode [ 284.468217][T17163] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.475295][T17163] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.483385][T17163] device bridge_slave_1 entered promiscuous mode [ 284.501195][T17163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.511792][T17163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.529960][T17163] team0: Port device team_slave_0 added [ 284.536500][T17163] team0: Port device team_slave_1 added [ 284.579200][T17163] device hsr_slave_0 entered promiscuous mode [ 284.617390][T17163] device hsr_slave_1 entered promiscuous mode [ 284.657002][T17163] debugfs: Directory 'hsr0' with parent '/' already present! [ 284.725988][T17163] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.733138][T17163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.740543][T17163] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.747655][T17163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.787638][T17163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.800885][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.809480][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.818515][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.832483][T17163] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.844741][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.855043][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.862146][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.877308][T11226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.885703][T11226] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.892803][T11226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.912905][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.921883][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.936265][T17163] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 284.950943][T17163] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.966487][T11226] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.977783][T11226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.986160][T11226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.009389][T17163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.018495][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.162267][T17172] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:18 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) setreuid(r0, r0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000580)='./file0\x00', 0x8, 0x1) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x5, {{0xa, 0x4e22, 0xbce, @empty, 0x80000000}}, 0x0, 0x8, [{{0xa, 0x4e22, 0x4, @mcast2, 0x8}}, {{0xa, 0x4e22, 0x4ddb, @local, 0x54}}, {{0xa, 0x4e24, 0x10000, @mcast2, 0xa51}}, {{0xa, 0x4e21, 0x8, @local, 0x4}}, {{0xa, 0x4e24, 0x8001, @rand_addr="671662a9807d56d7b1e655590d6c9c0b", 0xe99}}, {{0xa, 0x4e23, 0x400, @loopback, 0x6}}, {{0xa, 0x4e24, 0x3, @rand_addr="d82ccfe95e776406ae942d606a7eba77", 0x8}}, {{0xa, 0x4e22, 0x6, @local, 0x8}}]}, 0x490) 13:19:18 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:18 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:18 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x1fffff, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000300)=0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) getpgrp(0x0) pwrite64(r1, &(0x7f00000003c0)="450d8da953534bb067a1bcb8c100a2dd21a6ddb2c2bc9cf08755516afeaed6bfba28f424f3e924ca9cfe862a237e9cf88c2e15005d8e4a0e603c95020ddb56d42bcccd834d208e60acb969a06119f6de7ad7e91b12c349a251dce9022c5d1fa3ba434500e3683f5a54ab7add294b8cd41b9928cb35b3315f9e85214bfee1ec37398343174c16c740ebc9f563d26cdabfe6429a7d2c3432098736ab624ac9e916a8ba328db741dcd6fc1faf8b0dfa4c56e5d3f5e865a68e3fbd73a88e5c7a", 0xbe, 0x0) r2 = semget$private(0x0, 0x4, 0x400) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffff3eb8}, 0x4) fcntl$addseals(r1, 0x409, 0x1) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000000c0)=""/203) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000000)) 13:19:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:18 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) pkey_alloc(0x0, 0x3) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)=[&(0x7f0000000040)='\x00'], &(0x7f0000000240)=[&(0x7f0000000100)='selinuxvmnet0vboxnet1\x00', &(0x7f0000000140)='#vboxnet1++nodevtrusted*posix_acl_access7keyring(\xe3,selfvmnet1 \\uservboxnet0\x00', &(0x7f00000001c0)='&/keyring^-md5sum\'eth0cgroupmime_type}*\x00', &(0x7f0000000200)='-@/vmnet1userem0\x00']) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x4, 0x2000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001e40)={0x0, @multicast2, @broadcast}, &(0x7f0000001e80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e80)={0x0, @broadcast, @remote}, &(0x7f0000002ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000002f00)={@dev, 0x0}, &(0x7f0000002f40)=0x14) r6 = openat(r1, &(0x7f00000003c0)='./file0\x00', 0x4000, 0xd2) r7 = fcntl$getown(r1, 0x9) mq_notify(r6, &(0x7f0000000400)={0x0, 0x2, 0x0, @tid=r7}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000003100)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000030c0)={&(0x7f0000002f80)={0x110, r2, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xf4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}]}, 0x110}}, 0xc001) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x80000000, 0xa0000) setsockopt$kcm_KCM_RECV_DISABLE(r8, 0x119, 0x1, &(0x7f00000002c0)=0xc6, 0x4) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:18 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:18 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000740)='hugetlb.2MB.usa\'e_in_bytes\x00\xdb\xa0\xe4i\xd8\xf1\xab{\xa6\xcf\xf9ud\x06\x8d\xe7\xdc\x93T\xc3\rR`\x88\xd0K\x93\xb4\x8b\x8e\xfdVo\xbd\x7fV\x8a-\xde\xb6c\xc9==\x13Y\xcc\x92\xfa\xa3PO\xa9\'\xa1\xa6\xc0)\x1f\xba\x83\xfa(\xd3{-\xa7m\x14Q\x19\xd1`/ \x18\xaefi\"T\x19\xfb:\xc9\xe1M\xfb\x02-\xba\xd2R6\xd1\x14\x84\xe5\xf6d\"\xaa\xe6\x8aP\xb0\xefM\xae\xec\xde\n\tV#\xe3\xce\"\xd5\xe9\x19\xc5`\x1a\"\x82\xc42\x84O\xf0\xd6\r\xf1\x89l\xcd\xb9^9\x8c\x15\xd1^\x80)i\x9av+j\xe0\xb1\xdf\xfe\xe2\xfc\x00i\xcd\x11\xb6\x99p\x809qM\xca\x89n\xb2\xc5\xb3OA\x86\xf0>\xb2\x8f%\xc3f\xe2!\x15\xa0\xeantt7h\xd48\xe5\xec\x1b\x1b\xa5U-\xac\xed\a\xff\xb8\xd1\\\xfbm1\xc4\x89\x01', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) 13:19:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:18 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = getpid() ptrace$cont(0x1f, r1, 0xff, 0x18b) 13:19:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x20000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @ipv4={[], [], @remote}, 0x10000}, r2}}, 0x30) 13:19:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:19 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:19 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:19 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(0x0, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000240)={{0x100, 0x7fff, 0x9, 0x101, 0x0, 0x9}, 0x8, 0x101, 0x7, 0x4, 0xfffffffffffffff7, "e3a3988ba593052c7d84117b450f1edcb3455599603e53a3cab3a2d07efebb636112f0a52f941854263e001fc3a7c32f09b9b2ea5fc3b85bd52ce86f1f28fd25546b02b89f0b4a4184777b358d3de36c4e459f1bc2ef7081d1231d110323c655f698bbac27268398a40344abc13de9bc5ceddb6cb1da7f54b327f40a68ce6af1"}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) fsetxattr$security_capability(r0, &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x1, 0x1000}, {0x2, 0xfff}]}, 0x14, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x98, r2, 0x40a, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x999}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x8010}, 0x4) 13:19:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:19 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000300)={r2, 0x40}, 0x8) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:19 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) 13:19:19 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:19 executing program 0: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)=0x1) 13:19:19 executing program 5: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='children\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000040)) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000080)) 13:19:20 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(0x0, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:20 executing program 0: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:20 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:20 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x0) fcntl$setsig(r0, 0xa, 0x19) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) 13:19:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:20 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x24200, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000000c0)=0x6, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r3 = openat$cgroup_ro(r1, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000100)) getdents(r2, &(0x7f0000000040)=""/4, 0x4) [ 287.717654][ T29] device bridge_slave_1 left promiscuous mode [ 287.723869][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.787633][ T29] device bridge_slave_0 left promiscuous mode [ 287.793839][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.607344][ T29] device hsr_slave_0 left promiscuous mode [ 288.657012][ T29] device hsr_slave_1 left promiscuous mode [ 288.732719][ T29] team0 (unregistering): Port device team_slave_1 removed [ 288.742418][ T29] team0 (unregistering): Port device team_slave_0 removed [ 288.751640][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 288.790752][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 288.877130][ T29] bond0 (unregistering): Released all slaves [ 288.972127][T17604] IPVS: ftp: loaded support on port[0] = 21 [ 289.029962][T17604] chnl_net:caif_netlink_parms(): no params data found [ 289.058010][T17604] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.065126][T17604] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.072992][T17604] device bridge_slave_0 entered promiscuous mode [ 289.080791][T17604] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.087960][T17604] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.095471][T17604] device bridge_slave_1 entered promiscuous mode [ 289.111945][T17604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.122768][T17604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.139867][T17604] team0: Port device team_slave_0 added [ 289.146343][T17604] team0: Port device team_slave_1 added [ 289.199540][T17604] device hsr_slave_0 entered promiscuous mode [ 289.247335][T17604] device hsr_slave_1 entered promiscuous mode [ 289.286995][T17604] debugfs: Directory 'hsr0' with parent '/' already present! [ 289.334512][T17604] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.341626][T17604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.349029][T17604] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.356114][T17604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.395335][T17604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.408712][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.417635][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.425275][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.438354][T17604] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.449379][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.461781][ T2421] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.468880][ T2421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.489855][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.498675][T10222] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.505740][T10222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.518696][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 289.539403][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 289.550304][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.558889][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.570780][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.580610][T17604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 289.603452][T17604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 289.733442][T17612] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:22 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:22 executing program 0: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x189af587de2f9170) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0x2}, &(0x7f0000000100)=0x8) eventfd(0x4) 13:19:22 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x1}) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:22 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(0x0, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0x5, 0x20}, &(0x7f0000000180)=0xc) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000900)={0x0, 0x0, 0x2080}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/3, &(0x7f0000000040)=0x3) 13:19:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 289.991961][T17632] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:23 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x141000) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0x8, 0x9}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan\t\x00', 0x2100}) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000000c0)={0x1, r1}) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000001c0)) fallocate(r0, 0x0, 0xf43, 0x7ff) mq_getsetattr(r1, &(0x7f0000000040)={0x1, 0xffff, 0x0, 0x5f, 0x6, 0x70, 0x80000001, 0x6}, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) 13:19:23 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv4_getrule={0x20, 0x22, 0x100, 0x70bd2a, 0x25dfdbfe, {0x2, 0x90, 0x34, 0x5, 0xffff, 0x0, 0x0, 0x2, 0x10000}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10480080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x10) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:23 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:23 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) 13:19:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) [ 290.476842][T17789] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:24 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:24 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:24 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 290.909278][T17895] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:24 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, r0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20000, 0x0) unlink(&(0x7f0000000000)='./bus\x00') setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./bus\x00') 13:19:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@llc={0x1a, 0x324, 0x1200000000000000, 0x4, 0x9d, 0x100, @dev={[], 0x10}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000100)="1918199b09cc28d73c60f049813ee129ba2cbd953a7cfeea81cf5efc750de2b75d462518bf5d1b50066d4b66f2e88b6a547b211006cbeb1775f39ffaf671a20ff208def9f9655f45e5f317b86299b2bdc298f771fda461deab33efa3e8ff21f3629d3d06bfa27ba3da72fa741283c2944381cfa8d6b4da1e9c4a03e101e470df66d761579390dc5c39abe14115ac86206e581f0dcecdea35af8c794b2acc35ca65bcec51d39833f9816159182187bcb561028237574639d4a32a16dbcacd00c5954bbe207fbcdf714548d6a85e0187d0312e73fd0be4c63037bafead82709b6206fa56772194", 0xe6}], 0x1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x3330}, 0x80) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) 13:19:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:24 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:24 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:24 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x200) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000040)=0x80800) 13:19:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 291.471840][T18116] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x20000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) 13:19:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:24 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) 13:19:24 executing program 3: setreuid(0x0, 0xee00) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x56a79ec7, 0x8040) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f00000001c0)) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7fff, 0x80100) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000140)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x2, &(0x7f0000000000)='./bus\x00', r1, &(0x7f0000000040)="566c1fafb92dc75846faea3db33b433b186ac67358ddc5d89ecb0c5e2db61681d3d7a5549091568d2840cd45efd7cdf0c6cd802358d1aaeba2b1f7e1c2d5625e5b3cb2a382040cddf077df9324b3216e261a492b1500c52858c8c21d76be42c45c62034a8852186b4ac5cfb82e30651a00e16f76f16518354b50f9ce5129c1b16b829812399df0d0073b4aaf697edc696daf2bc20a982bef22c10fd2709c353a1127") syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./bus\x00', 0x4, 0x3, &(0x7f0000000380)=[{&(0x7f0000000280)="7841600016feaa0139c4eae11766d1b31f0ed8a0f2", 0x15}, {&(0x7f00000002c0)="6ea7913a58f26742c09964b2a33c822364fc8024a91b38eab0d394cc2d56be13792d0390640a8bfb42914d9a0fa31841b1650c5f1d7a9d81322f9fea8a0cbb1284e14cd3eee47cf276f1e34d27cec9334a5efd0c54f139acf09b9659fc1595e0b8039358f78c5aab1af3aa1c8a6fb3", 0x6f, 0x7}, {&(0x7f0000000340)="4dd57a9ed2288f46409656751cca566f6c0d9ff4", 0x14, 0x9}], 0x21020, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) 13:19:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 291.849221][T18226] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:25 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) 13:19:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:25 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:25 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000400)='/dev/midi#\x00', 0x2, 0x2000) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000440)=0x63, 0x2) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setreuid(r0, 0x0) mount$overlay(0x0, &(0x7f0000000480)='./bus/file0/file0\x00', &(0x7f00000004c0)='overlay\x00', 0x2000, &(0x7f0000000600)={[{@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}, {@upperdir={'upperdir', 0x3d, './bus/file0'}}, {@default_permissions='default_permissions'}, {@upperdir={'upperdir', 0x3d, './bus/file0'}}, {@xino_off='xino=off'}, {@upperdir={'upperdir', 0x3d, './bus/file0'}}, {@index_on='index=on'}, {@metacopy_on='metacopy=on'}, {@metacopy_off='metacopy=off'}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@fowner_eq={'fowner', 0x3d, r0}}]}) r2 = accept4$rose(0xffffffffffffffff, &(0x7f0000000080)=@full={0xb, @remote, @bcast, 0x0, [@default, @default, @default, @netrom, @null]}, &(0x7f0000000100)=0x40, 0x0) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000000), 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x9, 0x204) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f0000000040)={0xb71c, 0x7a}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./bus/file0\x00', 0x0, 0x8}, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="02082801000000000000000841020000140018000000046574683a69705f767469300000000000000000"], 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000340)=[0x1f48, 0x6]) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:25 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) [ 292.690021][T18358] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:26 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:26 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) [ 293.021360][T18489] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:27 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:27 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000040)) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setresuid(r0, r0, r0) 13:19:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000003c0)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000001d80)={0x1, 0x0, 0x1000, 0xe, &(0x7f0000000100)="59da630628bf315519d534617719", 0x99, 0x0, &(0x7f0000001cc0)="f638f8e500568ded05b119ae9b3346f1c28bead4498bb6a016f442dca251e58a9ffd25244e4dfc0cff9be90a99f80f23aac654f031f3ad3a5646f5332254899788df578069e2f58c17e7585e455229fd68e846ad4cec31fc509321ec4509d7a154dcc6299446d1917745ed231a40950b2671b8de6b89863f3e83c414a3d0b246d1e297f4df37a4b70a1b81603882cd15502693cb8db72696b5"}) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0xffffffffffffffff, 0x100000000]) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e26, @broadcast}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @local}}, [0x80000000, 0x80000001, 0x7, 0x5, 0x3ff, 0x8000, 0x4, 0x1fab80, 0x8, 0x7fff, 0xffffffffffffff81, 0x5, 0x1f, 0x1, 0x9]}, &(0x7f0000000280)=0x100) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x41) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r1, 0x1, 0x10}, &(0x7f0000000300)=0xc) openat$vcs(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/vcs\x00', 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040)=0x207, 0x4) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000001c00)) syz_mount_image$f2fs(&(0x7f0000000340)='f2fs\x00', &(0x7f0000000380)='./file0\x00', 0xea5, 0x7, &(0x7f0000001a40)=[{&(0x7f0000000400)="49c7613ffeab76482e91aea82d305340d9bce2952a28da5f135d0a4e9efb0916c8ff2448f37d84c245f7c3655ca8fa7d111f998ef764983b353882d6c30fed6ccb9aa3b791183093e19e0ba2662d2c13c086fea99d6e41c7e3ee2a4e466d77ab2f76e7c2e2b6c970e915822c0c27f56d69f41997bd51853e123e6312e307440775245fb4c2b77567c6578ac542df3e607d72e202ace6715128c5ac56d11b1b71435b47e4287128985672b9824f2b8fe8e484bcf6295852d04954f4c0c121c8df08e93eac296872d1b1547744934a7391fe73362b0fd7b10c96f5ae715ce1fa8fb67c21c3d622de68927d51abf20174313e6dfddae2c7112041f93dad", 0xfc, 0x2}, {&(0x7f0000000500)="adc73091e3a1cd1f628cb09fb904381b7b71701d48fa08d21cff280bb24b0dbbab56f4c53303f72d5e3450f628666b0fbdf3c8df170b2fa0a5a16db3a751efc8d473d946c3ebb6178e2d3fe22b4083fbfe18375ec2ae89cd56a3e1868d1523c458997fa04f83b5afdaf3f4843f1eca8bc333984089039854cfda33c7097492475b88d37fc68626ede91a0f5bfc7149c5db3eaa0ddad8b01be8057033ed06b59c0dd865a3b47ad11247471d9a91b0fe3d96fd9bef58cd3e57e7a7a4f97acf399274c4933e4b217bf7bfe8bc71d852e8ecd37dc98675ad7254aa0113c26a", 0xdd, 0x8}, {&(0x7f0000000600)="4103991170883907c93042002300bd565e4436ca4c787f2387c4d7eaa17949c751aa2a83cf02bb946187732a1c3276d1d3477ffc3e72a60b57d64f68270b6d76fd21cdd270b4f9df3c84ebecdbd741cde1913e2e2524d2ef5540986ac627422ccad42fda505ec5b4031cdf", 0x6b, 0x1}, {&(0x7f0000000680)="92886e90f43c2bf3a2c3faa98f808c545c32fa87f7215f49f7b9ef8073dfb3ad8d034ed6fd0a4c3f42127e40b85a8581c7fdb178d5b0d9290d203ec0200fb5fe09fdb0f8077b2796150057f36f3dee79e45282153184f374055e397b1a2d86a2a41f59b4bec9c90898c01f4dc60bd86e4f6a630f9d12626fe8d050c549d2508a848edbc72dc3e7fcb29caf8af2314ccd3838978a3f743fdd619f3950319b9406b0f0e28ba3aa4b24772628952955acd1fdb819780867070b80cd14facb1a11a59eea44f1cb9b9c4ac5205384a5478327bfc48f88", 0xd4, 0x6}, {&(0x7f0000000900)="ffbd790df3cf3f2f51af8995b8a6aec3fdb6aa605ee3e9202798042ec33e724c8d38626dc312dd824b51636b13fa8d3fdc1f2cffa8f4f5141e30ad41640e1d346bc6d87b942778322292a96d6d04a30fe346a7e2abdaeb379ecc2671b74e00064620cf66b4216c9e1e2b7c02c8f1e2931806e4fb6c1598", 0x77, 0xf54}, {&(0x7f0000000980)="5131eb77463bf6639cbe9916385df8b91c69b03b517f124d39fee793935bf4b88d500f70c31e4597d6a786f4b644592445105877776ea8ea22293530c28ddb5997cd09fce8203d07bd2d7af4796f779ff3e5156519f737ff25355a49610e23c3848223ea28e560be718237409ef592a838173b8d9d5ed30162a3ed8537989d1d0a1bf5f67c6ac5a34b50b6a657773b", 0x8f, 0xb1}, {&(0x7f0000000a40)="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", 0x1000, 0x1c}], 0x80001, &(0x7f0000001b00)=ANY=[@ANYBLOB='noheap,noflush_merge,nouser_xattr,jqfmt=vfsv0,nolazytime,extent_cache,whint_mode=off,noacl,inline_xattr_size=0x0000000000000009,fscontext=sy_CHECK,\x00']) ioctl$TUNSETLINK(r2, 0x400454cd, 0x6) 13:19:27 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) getsockname(r0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000140)=0x80) lseek(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:19:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:27 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 13:19:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 294.798055][ T2567] device bridge_slave_1 left promiscuous mode [ 294.804263][ T2567] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.878206][ T2567] device bridge_slave_0 left promiscuous mode [ 294.884441][ T2567] bridge0: port 1(bridge_slave_0) entered disabled state 13:19:28 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x79, "41f9565140b5023940242a07463b5a28d759737da7656ece1536137a8e1df4c400add1a56aaf7598dd05bd014516620293f16d8165e8e4080f352e367e9605e73acfac8bef728552430e3f16a9b51f92d6e0f0d7613eb8db3be05ad7356df61bf041106208a2ad6f96370ddec05170f7b704a3a50ef232d8ee"}, &(0x7f0000000100)=0x81) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r1, 0x9}, 0x8) 13:19:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:28 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000000, 0x20040) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ioprio_set$pid(0x0, r2, 0x6) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x1000, 0x1}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000100)={0x80000000, {{0x2, 0x4e20, @multicast1}}}, 0x88) [ 295.961884][ T2567] device hsr_slave_0 left promiscuous mode [ 295.997466][ T2567] device hsr_slave_1 left promiscuous mode [ 296.042870][ T2567] team0 (unregistering): Port device team_slave_1 removed [ 296.055260][ T2567] team0 (unregistering): Port device team_slave_0 removed [ 296.065263][ T2567] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 296.141026][ T2567] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 296.207988][ T2567] bond0 (unregistering): Released all slaves [ 296.322957][T18770] IPVS: ftp: loaded support on port[0] = 21 [ 296.386223][T18770] chnl_net:caif_netlink_parms(): no params data found [ 296.419476][T18770] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.426970][T18770] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.434949][T18770] device bridge_slave_0 entered promiscuous mode [ 296.443288][T18770] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.450946][T18770] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.458952][T18770] device bridge_slave_1 entered promiscuous mode [ 296.477918][T18770] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 296.489897][T18770] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 296.508553][T18770] team0: Port device team_slave_0 added [ 296.571041][T18770] team0: Port device team_slave_1 added [ 296.632377][T18770] device hsr_slave_0 entered promiscuous mode [ 296.697305][T18770] device hsr_slave_1 entered promiscuous mode [ 296.737024][T18770] debugfs: Directory 'hsr0' with parent '/' already present! [ 296.757128][T18770] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.764492][T18770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.772250][T18770] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.779735][T18770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.825252][T18770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.840015][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.849360][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.857487][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.870900][T18770] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.882781][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.892929][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.900269][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.921980][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.932469][ T2421] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.941827][ T2421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.957626][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.966720][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.975587][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.988130][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.996050][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.008490][T18770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 297.026117][T18770] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 297.107244][T18778] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:30 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 13:19:30 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1c1000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000100)={0x7f, {{0xa, 0x4e21, 0x8000, @remote, 0x8001}}}, 0x88) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:30 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:30 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x24) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000100)="cb10b5cf14c16adb865d0b52df6c3f3bdfed90f6d63c4c10198b117371b0b5ca000809440706dfa0fb7a07eb5d083c076b86bcbe24c182d8b00b493ac8817c7797e70e", 0x43) ioprio_get$pid(0x2, r2) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) 13:19:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:30 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/btrfs-control\x00', 0x100, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000580)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x3}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x4}, &(0x7f00000002c0)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="7300b851001f004d89"], &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={r1, 0x6a8, 0x9, 0x1, 0x5, 0x2, 0x7832, 0x800, {r2, @in={{0x2, 0x4e24, @multicast2}}, 0x77b3, 0x9b, 0x9db, 0x1, 0x6}}, &(0x7f0000000440)=0xb0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000080)) getsockname$inet6(r3, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000004c0)=0x1c) 13:19:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:30 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:30 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setreuid(r0, r0) 13:19:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:30 executing program 5: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 13:19:31 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:31 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) 13:19:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:31 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:31 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x101, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @empty}, &(0x7f0000000100)=0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000580}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="780000002900100827bd7000eedbdf250000000066fbb94ff42cf21f7ecb5177b75b289c4c1fa0d81d468e61587e3aabf8197d1413d272c9c8fa6f5a6030b8219b4ddb1c59a6fce7621b9dcd752081e04625", @ANYRES32=r3, @ANYBLOB="100038360c00ffffffffe0ff08000100716671004c00020008000200010000000800020004000000080001000400000008000200000425b6e79317c4350e000008000100ff0f00000800020004000400080001000800000008000200ffff0000"], 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) recvfrom(r2, &(0x7f00000003c0)=""/250, 0xfa, 0x2, &(0x7f0000000240)=@ethernet={0x6, @dev={[], 0x13}}, 0x80) 13:19:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x7, 0x5, 0x10000, 0xaaf7, 0x9a}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0xff}, 0x8) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000100)={0xb, @raw_data="bd81f870904dc24bd70ba80721dfbe9af363282286a590fc74fa54eaa504dd59cf7439ecc91f21f2fd6640fc9244b864325618079473fcc347fde2a068d59ecf8f12e4854d07ccdefc6401efd949ffddccf885f5a750d91ef04e7549b0258ef9d189bb26e66913aa73971d6465c9373ccd676cb337ba456fd4b27bb67d2e48980d5feb6d8b0247228ecfe58aeaa6657b4f9057e2b922724d054626a6c0e8f53005d644e6ac473805cd9f6d37e4d8d222cb13763beca80ef9e9b26f535287025d29e5c69da6ee8f1e"}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 13:19:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:31 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x200202) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x84, @tick=0x9, 0x80000001, {0xe64, 0x2}, 0x8, 0x3, 0x7ff}) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) fchown(r0, r1, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 13:19:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x7) 13:19:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:32 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:32 executing program 5: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) 13:19:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) [ 299.317740][ T29] device bridge_slave_1 left promiscuous mode [ 299.325000][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.377778][ T29] device bridge_slave_0 left promiscuous mode [ 299.384526][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.217342][ T29] device hsr_slave_0 left promiscuous mode [ 300.277129][ T29] device hsr_slave_1 left promiscuous mode [ 300.332733][ T29] team0 (unregistering): Port device team_slave_1 removed [ 300.344637][ T29] team0 (unregistering): Port device team_slave_0 removed [ 300.355762][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 300.410872][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 300.489314][ T29] bond0 (unregistering): Released all slaves [ 300.612653][T19098] IPVS: ftp: loaded support on port[0] = 21 [ 300.679278][T19098] chnl_net:caif_netlink_parms(): no params data found [ 300.708457][T19098] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.716104][T19098] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.724445][T19098] device bridge_slave_0 entered promiscuous mode [ 300.732407][T19098] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.739688][T19098] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.747877][T19098] device bridge_slave_1 entered promiscuous mode [ 300.766426][T19098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.778311][T19098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.794934][T19098] team0: Port device team_slave_0 added [ 300.802380][T19098] team0: Port device team_slave_1 added [ 300.859161][T19098] device hsr_slave_0 entered promiscuous mode [ 300.907456][T19098] device hsr_slave_1 entered promiscuous mode [ 300.947169][T19098] debugfs: Directory 'hsr0' with parent '/' already present! [ 301.013511][T19098] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.020857][T19098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.028326][T19098] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.035730][T19098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.084383][T19098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.102880][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.111884][ T2421] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.123182][ T2421] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.136155][T19098] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.152151][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.163643][T10222] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.170838][T10222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.191919][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.203810][ T2421] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.211009][ T2421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.234148][T19098] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.245390][T19098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.260223][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.269880][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.278817][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.293888][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.313061][T19098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.321057][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.330321][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:19:34 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) [ 301.417278][T19106] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:34 executing program 3: fstat(0xffffffffffffffff, &(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000400)={0x1ff}, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) setreuid(r2, r0) r3 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) 13:19:34 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) 13:19:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:34 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x0, 0x2}) socket$inet6_sctp(0xa, 0x1, 0x84) 13:19:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:34 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./bus\x00', 0x81, 0x8, &(0x7f0000001640)=[{&(0x7f0000000100)="f10c05816fae44b3f17c60e61857e8d9b8084364bff571cb7719c0d023257d314ebcff7d44de3bb1b087aaf658fb34b2db6518bee8bc7eac2a85bcf34fca96f28487ec480cf2f13e36e0af40b0b693a83e4c128091f4436f19c038de2223b096117b6156b8653382c06e3a3e46602062cb97681b5782da318677cefc03a8190ef1788e08388651099c9efe4a274d9c23751f7b254f5002cb939b244317dc372e60ea9c451e78e84fdaacf158cdede31bd7846f149fb5da34bf466d1c2634cdad7a", 0xc1, 0x54}, {&(0x7f0000000200)="af959f6987128679381a72edc01ca7e73712f1334a67222f3112d2a3c9d4c6aa708fb4159c77b28e064ada15eabac2331ea9e04d9248a10bc8dca3b190a026c1d8052bb4b92f1368c461a90bfa71ab428598b4eecf0c708487a48cb9effabf586a4e8e6b561fa064c63d8a1a65f80b4e7e4e6cafd04c05bcb1862c9149f20516a1be41e052de12617fc981bc63f88cf112988dede0742cb90275807eaccb48a3c9acf84b720722d0ddf2b77472217c76f3f07c377d0018f916a0be574992108dd6d127d26b3e07387dcf", 0xca}, {&(0x7f0000000300)="47063c7c2bee76e2bee4c02ba1c90ad0414892b70134c3c2952fc16ce8ad3c26490be81963293400ca439ffb0bb2f8ef69a155b8dfb4dd9c84476ea3c1bdcf1c8bbb49522ab33b7161f71781a915d8acce4772fc42ed2cebdfd842cb4e588a070dd5334938b9ddc7f91cb58f4fc113c51535499743ebb771326448e886f266d232de267946928dd6066b0ce5c25b181b15a6f17c5c3b318924a6237b84396519e12bd309fc02ad201a1f5403b6ca4ae5e8664059f64ff07c13c43585f3923e36f9a4a243eb18e2ef78c56f5575edd72bef76c6997d6f1dc26af24924e40873edd1757dc0c4224d21d0f22622a9266c4bebb1e9596630b7fe5d3c", 0xfa, 0x8}, {&(0x7f0000000400)="bec5f0c6f4808ac16c6f008c49f1c0b0dbaf7bc83d6f07d70154d9ecd9a82cf3f1dfa433628b7c27c8b281da23eb82866a6eb4b1cc458b83a5752673daaffc9883b047316dbd1523d5500b41c008f76a28dfbe71a5d98bc264c2ab1ccd59ef880676d3e7de334b63c7281d7740b058f4f0f10acda8ce7c7dd35175d6bcdd3afae3e3c4d7e92e7d979d38b3b23687063bb9f1adf27ead00c4c687b4", 0x9b, 0x40}, {&(0x7f00000004c0)="8e4e032cee7be926f4c91a2f7ea38697034d883605d91737d5742a327bafe164bf2c932da3645b47cc986aeab2d3b5acaf798cfb72371b97fa858c19be82361d0414a97b5aed097c4f57015827941d258a5fd73c36ea31712774d9fbbcfeef1517b7e490a62f0a89b98bc206ed9dd85245be02462564fcf19ee27eae9150dc34cab2ef8683cd9c7db686a07766f90174105542f19aea2ef7ce1367b9036a86aec76c04e3cc3785b34aabd7cf", 0xac}, {&(0x7f0000000580)="46ee80eabb51ba50fea7a40aade788977082906474269e9a371bbd7707aba1c87a243310cab366f963dd09553402a899bf1dcf5d28cfac", 0x37, 0x6b}, {&(0x7f0000000600)="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", 0x1000, 0x9}, {&(0x7f0000001600)="1a5d97e721c283fe8872ca59b78c8ff79263b25b6508d9b2db62fa1da82c776dbf64e73316aacd19ec2556a6c52a83cc33bc4f4f3b48", 0x36, 0x7}], 0x8000, &(0x7f0000001700)={[], [{@obj_user={'obj_user', 0x3d, 'em1(#['}}, {@smackfsdef={'smackfsdef', 0x3d, 'nodev!mime_typeem0bdev!'}}, {@subj_type={'subj_type', 0x3d, '/ppp1vmnet1trusted'}}]}) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000000)={0x81}, 0x8) geteuid() 13:19:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:34 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x501000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, r2, r3) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) [ 301.926725][T19176] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x437d9799) [ 301.967174][T19176] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 301.989219][T19176] F2FS-fs (loop3): Unable to read 2th superblock 13:19:35 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 13:19:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) r1 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@local}}, &(0x7f0000000400)=0xfffffffffffffc4e) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) r7 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000640)={{}, {0x1, 0x1}, [{0x2, 0x4, r1}, {0x2, 0x6, r2}, {0x2, 0x6, r3}, {0x2, 0x2, r4}, {0x2, 0x2, r5}, {0x2, 0x6, r6}], {0x4, 0x1}, [{0x8, 0x4, r7}], {}, {0x20, 0x1}}, 0x5c, 0x3) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 13:19:35 executing program 3: getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080)) setreuid(r0, r1) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x4800, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000140)={0xac1, 0x4, 0x4, 0x0, {0x77359400}, {0x5, 0xc, 0x9, 0x3f, 0x1, 0xc9, "7aac4040"}, 0x401, 0x3, @offset=0x5, 0x4}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x1008) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000280)={r3, 0x1}, &(0x7f00000002c0)=0x8) r4 = geteuid() mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) utimes(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={{0x0, 0x2710}, {0x0, 0x7530}}) setreuid(r4, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:35 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:35 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10100, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) 13:19:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) 13:19:35 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:35 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001980)='/proc/capi/capi20\x00', 0x30042, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) setreuid(0x0, 0x0) pipe(&(0x7f00000008c0)) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000900)='/dev/admmidi#\x00', 0x6, 0x441) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000540), &(0x7f0000000580)=0x4) r3 = getpid() syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./bus\x00', 0x7fffffff, 0x6, &(0x7f0000000800)=[{&(0x7f0000000200)="468fba48150e782e1774478ac67f6584e52ee497bf2fe8aecbced01a84f009768e4920660224dd64c9ca398c5bee25d49bc6507729dd4ee6fdc380c2f9d450cd028c27032449256e2d6514cee6f2f69e14784eca8f144e689ca3a88c25e64675a8914ed10ed9fcbf1c4dc06ccdbf331e67495e2c0ec36e1cd4e0c5047b3cc9b0d3383ea85fb7a1d7778b7c748f3205ef21028676f4f067c58c36ef631ea30ac5d5962b1a86d673cc5d495f3c4937d91f62a588cd1ceaf1d9800bdc2db196839b530e43cd89953284768891931cab3a51b5f56ce9e1660ad1ad1f729be0a059337b41bd113f71abaed05eb73ee8", 0xed, 0x2}, {&(0x7f0000000300)="d35266a7464137e7b9d5bc3cea61844b0b4597ab0c6ec897650e24f5bfdce000ed6c56cc06d08c8750947ba1c0d733f446b4f4926160bdcece", 0x39, 0x7c}, {&(0x7f0000000340)="6e699bbbea4f1151a598a46a718191a00c1844b294f99aa3a490cf47ede1fa65c071cdfff4c3600f6ae16b8a1f4a754253de92efa68a4751cbf0dc7fe981a74439885f6e036ee6a1b97163ec834667095f67febde14b7c63937ac64deab24723c6a84b8a72e9ffde3709e1138ce824c04a45bd45939f60cb7d837a7c6bb12d2349c1d9f67eb57ff9d6dacbe88de2b095ce8fb7b227d92e824c01896e35c46e15b4ac9b02ddedc309539ca56bcc9a694a84984fb76e8bad4ff589f54fb2e32e09fea2b4999b7c7872b3813edc2c74560d6efc8ef4b5b569b93c45e34623979a7ebd0d3fbc74d29708587c77a1c8625fa6d509d94381312cf690dc33c3", 0xfc, 0xe27}, {&(0x7f0000000440)="9e394edf000c5baeb191c53697bea2de3b02f18cbdd0c9882ace3c576a9b802ae9fc90ea1f8a8f03ef7394d7e61589ba42c59350105022de795df11eac620a2a7b50c85a39fde6eba684a8025299fa5e5d0c765438b364ad24b5f05d2a7e80db1fcd309507ee510efb6d91f30e5f5958dcf57d4b8230de1cfd7228e7e965d2b986a7402515c94d7a8b2ae2650e9a634c75b3183d2429159ba51fb1a2707db7a215f8331f3ac716947c10ec2c3717776d20c9f8749f2ce2c08ad00f11cf3e1b8c2eb814ca1f206a39b9a2d65cec14d5e4b352911527c6a9485e47e6ee076a21674cec5490532614ac2ccc03", 0xeb, 0x5}, {&(0x7f0000000600)="590e72e48aa9c9697782284bdf62d285290b1df0d5109a7de70fa7f125c7f0ed8b13f7e7452f0018380c77cfa65bb4f83fdbed421bd5cec27949c53332e6380df150c7ff8b7d70463f9aa7729cd94fbd675427444469926eef527f6a31d96f3fc21822212f96e814ee43be3de80baf02a41abeaa35f64d31cd350fbe771a7ec45e00dcf5cf4c74bbdf5ff20222b96847d7e8d6a17a535e5050bbd68ff0190b52971da5fe4af4bec4b242d411084aed2e257b2aa8707ca50486af6052c93305a973f96d24795db743b837b6aa01764b57d3", 0xd1, 0x6}, {&(0x7f0000000700)="15cd5762de7b58ab3b8f478bd2985c0363af536ac954de8a2d5dfeb4a959dd2dd79ea12e4450e999eedefe88ea82c2e1799e3673be1499d06eff7a3e7ff3f34e02c73a97d68cb1c70f1f5bcfd3041a99209ca8426d9e39a36fc9ef245c9b3c6f14c7002d840f15f13d222211d9b5548bcfb9063905caef918a69f18f62eb23454f18de29a4c8d0df999a17f86d17a2d2b62a395e55cf13bd1fc2257dcfe127ad4b8501611c240da08f62ea883260c48a8838d090e961160fae7e8b6cf9bfbf0893c5747cbd647efb97e839f980f4b04f6ffd1ee0b9", 0xd5, 0xd1d}], 0xa0004, &(0x7f0000001ac0)=ANY=[@ANYBLOB="6e6c733d6d616363726f617469616e2c666f7263652c6e6c733d69736f383835392d332c706172743d3078303030303030303030362c73657373696f6e3d30783030303032352c736d61636b6673726f6f743d6d696d655f7479736861743d6d696d655f747970652cc8f895a0d184f0580000000000000000000000bac9a002acd8c05aa8f8bcb22194e94582bf15e1b622e159e736ec98eb731ff6b2dcc7568d0409f98df3705598d7dd3c5262bba427e28655b92be4b0a1086d4578b92bdc9173ab9444fb9515f1056d5b"]) sendto$ax25(r2, &(0x7f0000000980)="29a6151d6693ae0eb1b6ade0dedd91450e2c5cff09c40360d10555240545c6922e40c6088da6f0f50cb17e2721f0cbb99690996cbae3225e1c322194d0fc6a81914836be068258be658a56c9839c48a0fc4e7c382c559bc77864bd8b774ef9ebb78aec0907948ae25d1b5f2546bd9ed117a96aacd0fa60b9c354a7bdd01d4d7c7ca5055d00223ed34e6c0376216e085f767d17e96905ffa33a3810560d22e550bf2c7e621362a0a2ef674fb929ac2cedcef24a21d20567aa8642c5da1f69fb7e41076585a3c700cb716fa6fbacad60371b70b70ba831aaa82ac9bac96b2443b17af684baa663c965928d234327b7bab6764fa389c32274813d835201a46d2c73f3faf790f653ff3f309ae58cd602bc16264d2073d5a94ce6c45bb8242c36b06bce3a416280ded9d0b734e4d17cb18155d9b9125e65900a9f48777bd205ac1d28b74b39f34ae7bbc1ff4a76727d6aeb49801933b980e8fbf7f5d8486a62540b481a3bcd702c7b586202103b4a3d3f5d1947875ef023a1b4278ba089fd5fe92c67c13b0506e93f0e27baf0d9b7d2c15b6f9e8d7fbbb28bf2f7d98771ce65b3f9715005e0020cae55178164dcd926ecbc7f67b8999505e519cadc4dbd1ecce7cbee124cc22c498050edace75ee9e8c0f85e69c93ac54a2e4f389b01590711bb5cdec3886977cab1c56f1ca6871f4767bc2beb7376786bf6d3c683724790adfb638bd0023a94022aea795d0cf3b95808ef8aa283508cc28cb5b06d11c8ce8d0d4137ffe581963e1ee0127ed45f9590f5d90574358253db2a9ad803e15148f41583d2ad6ebf7021a4fa7de9002ebadafc756fafcb9b886cdab704dd571ccfbb9a2314ef9637994c2ff6adaea2b82748f49a1974763ad73430db2a685735408f04d18c590e8feb971396c1d809c7abed2ba3c2f85ba8c0ea0b9d2a5adc84aab33d43ecb7d54b863d0a4a57823051f56aae54f6bfcc3e0d57a876ce7c3eef53271fd8730a54c1a12a8fc877e63b7303dc6ab8e3987cf89226a93a134254a42e07353c74036f273ae888019da49f777b761a1bd25cda72d37cc95400a72dfc94412db77b576ad589da0c98c22ed22b703cdae8327d1b230d996ad570bb23e61322548730910709f453c2572620140c757ced455da7b6f129c8e8c70bdc389ecabad3a753fcf9ef29b7a4902d65272478ffaeccf92150f78392962537003c01d227076f6969a65b91dc6b19e89ec2e3f2d277b149610f090c439916bb0966c6e55ef85f6853b5d9bbb60d00925f4c28b2f21059ab456c6cf57ca2b3df3853dccc580a535a0e314ef3a8a5cd9d75d04e02149e86c406ea8fcb6e39013f2fcb9bb44a75f76e318d3d6a88b00a78dfb7882d92853920fa6845e442dfb753177038d3ed08d27a1e9e83e1d234d1f4031b0b77f062a4db02832ad9c6da80db25166ddd2e708b6cd73cdc7f82d2e1d66484072281fdac1f33f1ffdb6ff4d67410ecf1f85708c8fb7e40476d8eea578158190ccfd31ab3f0f9cbcd5322a3fbf327791b1d31d8cc08e5112ebbda8d58e4b16357e53277ff92c773715b208a6b139facb8d27463399dfc5ce4faad7c108343f4f55adb169112ecba321d1d911c87f96791710013afb02fe2a6482b24ab949068fc57db38fed49ed609b5e651e50473b0951cc875e2071905dd8e99761f9cdf660db6c9ce790226a9babbcd60a9aaf491a0099d37b3755a3d84dcfb65e6afe2e8f2e3a8e48e6be56c64719a63da72d014f718316411932e8a54ddf7d9a08f5dde1b26fe90cbcad5c75f6ded705f2bd188c6bfb5334e5cb04d0967e41032020c760cd88c82664b3915493427f8a05d1454d82e425970b774f5922a6a376bbdb083efcd6210ec617876d26d16c8fe99d6fd481404108fb75f2106b5dc2441a0929ff492384caa28e258e4aa852f8dff12adf79813eaf357fd9dfc4c67b84c9ae6cb1df4ac5d95b7b820697e6483edcca62a0717af6246231af6ae85e075b83c9b05dc0d5f45715767200c6e31f32f88cc2e33b72b828bfacd8e00c05a767e4b2c982995cb946f045810886f24bfae20d9e13935be3937e3a8813b9627e748486dd78472814e8114856349c8751121ef16a9ce51db074de221be281a7e9bf539bff9c6e9288b0f57009b7fd17fabb9d9e339ab743152ebd9fb24ba0812ba0dd5fc1f8ada5e3bf854463f1978a1e65061cea72a564d83f197d87680d1e531717f149d816ab37b7a6b20b9d9d409228b822de957dcd6348a0afffb58a5a2e8bd02b5e2743876a9eb913a89fbcc905d0066b7007d2302c3b88165bfd7667d6705f18419d07896c0092748fc786c403e2d5c86d8c474fd755913f7ff8df769bb0545e5b3f9da32625240efe749d029dc68e0b6b6230de52b4d566896dce6fb89d7e1ec2414652e2a15526d3ee9204ac68a1ef8e46a9ef805316b603d0b36ec3543f114ce3c144b504b249ddb9f5928436e42b0fe49858631ffb1f72bac74ec20a5b2571200a989dadcebb82b730e6b64a069ea54168e5f0a92285cdd2919489f47993ff1f07542ab541183b6df8868bc6502679c29271211b15292cb1b15dd8796324ac08bd33adcefd6043de71a35bfa442940cb5b2cfc40fa8f57496d1adaab1e961490f556da1fe60d25e68461502148f8a7ba2296cc5059cdf43f1dfddc2600cddc3d809a6680ff197aef4fe5f1dc51a455c4813d207777d1cda27e3a4abfbdee076a62685e9d6d18aca6da4c06755db422ec8feeac119b261f59d26f46a7cfb80aa495b5a905330ae4d4062168989ea8ee3bd274f228112ef6a8a50d9976070e915d916fb8dbce98bcabc6fb9da01ea1c1be6eb769273651a4b617fcee1800a478d0ca8caf78867d1039add671ca972e08ac92b2b15d5a979b8ecce85eab0cc0113eae122ce0feb39e44d4ed8f6bf217a7826aeae798efd92be4c066fb104d2d9ec0fab76942636b6db939126ff77acdb181266db88be11952c5866b62bf9643c5af6de3dde1b0f437546167c678494220dbd40a8587bfa858c677b0122d710ae15560065651a4cdcf9bb92c62d242eb4081a258d9800e8671780d930d19ddab8c7c7fb8f4c729737f5ae3105302e29c737537c5b0ff4d6cce36f108c7e690abdb7673ea7d653533b5cc22d84f5d134fbfdce4b1f1212b8f086b3bec91b7b0d035f5c53e75849c90f68d7cb8f06f3e748ad8ad68c54a1b4e918c2252bbe1fe79e15f6194ec9d3634d641c8a5c37c136c16b9bf2d3184ef1feaeea96673ffd9596f5f0f855416842e862d937940f08a8b16cb1e2e654396f29441a3a831ce8d4f0b78d71fef99d2cd83118744adef4b5d1237196dc76451e6262507fb2ccb1cfbfdbc19b41b773773c093bc4ca5694e3b952e955e9d00778ec6d8e8fb6c400c3861382ffebfd6afeb06515d03766243eadd83d691216b7ac17f80e991a5c606fef3fdb55027c6e04254e32b699d41331e76d7996c09ef5680ccec75cdcb6199073d68dc01e5a70c63534298412a00df4865fe0d404ad7232972d3c9ff0e402aef8d30774b32e04a967e48413db8f36c0694b722f5a5fd666a4364b7b768be4d35deed40fc062262b7f57bc828c819a62156614e1db677b3459ea8a11f4d93242e10ac6f5822749fd3e3f10011ff0298c79541c3f1ad75358ad73b3b2cef480f2be8a83ad70a33dc43ae5b4d314840604f0d6a30304725fb77839b1e756cae83b42ddcb3c8e65de1622fc40b79c5b3f915a8907edb01661ed2f29d7c0ae7a2396f7a3340c24f8bc415c39bc668575e57b3cacc231797afafcbdfd6b85813c39fe2abc83b3fd394c6d88ab89349892093b8701a6b7ddc08e04307eb5e8e193394f8cde4bb775dcad39dd53e443c4604b3c9d301735199954f6539caf2aa7eab1bc09dd6045391ff94e2c53c002cd1512b6b712f9940cb3166cc1e8beb4e47969ee883147017bcdf60d5c536750aca5b5ac0bb16b301fb438f20eee674901f68c58197da5bbb72ebbb7911b180f06c50d2e40af55e50894e03984f2fdda1d9bfe2debd5a7049864a163c0853e43b9c2dcc8a048610f02115827ddfc0ae092336ba41ae6eff1ccd7d5ac1c94c40e1e1700a9a7ddcf9f54dd56dcc40d93a7f799f0d5874a815c2e1859494f08606bd0b723d402a8851b605d68e586767340826e49d532c91ec12a16a6d32ed671b66376f10b229c535f2a4257afd0d82b3b014961c817499ce76e5038cb0e6b427f3e7677f2a2753334887d549aa66be29a07c424d150203003328398055b686ce791cc295e944646735cf0cc11473aecda5f2d8402f69267fb117bb83cbbf39e5889f8aa515c01c7089f703503db23b04407c53528829872898a907a6d2738737ae90fea12b8fa51aa692a6153e4cebb08f308740501472409140c3d481d0805d869535c68785e0402636eca45990b01b5ce9d9639b774582171283dd77f997f97612d95810a2fc8ca59480c2f97a7a6b8e7515ae1b36ed352c79ddb951bd40eb39820256a2aa48a9c34827006bd03bb2f6050a9e15e8656f6be9e22a2ca3a4a88c489733aacd6cd22338ace1e0de0bdc8804cb234e8edd8e2c509597aac1090c79640dbbb511e364dfed03d67f4e62cf1fa610c6e95d682582d44beb1d463d26710ed40617e1251a97d2d805602c7eeee24cacb541b18fa43aca95e54bcd06f856c68690b039d4944bc9f80e8bb70dc7febc248372fa7b93de44daa1356c06674a45302d2589ace8b23df86ce0ad7631b649bcbf3ef18408ac962798da6a4d1881d06bf2b17fbdc31bd2b79ff31dcbdea52d341e499c05f80d05a7c2699015cad5a834aa1eb23a577d5aa1a4cc6e6e2808dee85affeb0eb80f914ff9e4ab0b6ac7ef47f9a910954dbe6a8d75f8818af2b4e974d1140d1a82201d6e6318cfb4774f13c19492abf95580817c6ff9ed51bddbb302d8e209bc79afa0937eab3d1eedcdf80f55911b88d2dbf1ce51d873fb8876087166206d37b656657198d705552fda81d360f171bf1e2b59529442748a355d65ac2732a9cd37cbf2301af2c747d526415d5edf06f78248504582f2de70b70cece308055a084b895f46a8f54fdef1af562b5eaad63dc41ba39e8517f385b6e38c82552f3889d010fbce4e23776bef4e78df96039368c9c7b9574c0c7937f30b6a108b6be7ff7edad756834f2cf3447e2fd249de661c8fff1065d584a494563738fabcc3a5dad2f07501842843960cc8f77013da94f5a54aa5a67e46c06b8a9b5f2fa81e1b51268e824f0f4688ef1187eaaffc66f44d40c91cc1b803d8db015128776d1be82e0078145ee45991d6c7d0a51b138bde96620e20638cf91598ad62e3a62a9c7e40b55cb9ab101f295f350a886f140069070b0e8d75ed6912b84b24d51fe94956d11b081d838f47f72d068de4a946e49f8bf07068e420e90e93cfd9e164abedbc8513d2dde7e0540bdaea2b0aa8a829f8cee8388d35c5f7581efea7c02d14ac12fbb0a8678eabcb452a06b5b7929a36444321a2e9012e7a92564e2bfb3e1157834793945daea30903718ec981fad0c5308c4b38d2d5e23a4ce4f1f0a2b3453459f9ead4d9b19b318b0bdeab77562046708e9d00e8e1e2219e854c5685b6af156e9da23b623e80e883d8ed6b0751e127cbde6cf93612322d0267844ebc08e9986cfc5a4660ef3b482993a0b995c2961f463f9b5b29c92b52b7c9ef96b8f01b0e8a8695f35e2a4837f470608cbaed4f3b21bc0f1fda2fa391aa1c141e7f6973112afb37186ce08ead2d9a075ef679b28542bc619c747d7d6", 0x1000, 0xef93238c84d9d3cf, 0x0, 0x0) getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000100)) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={r3, r0, r4}, 0xc) 13:19:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) signalfd(r0, &(0x7f0000000040), 0x8) 13:19:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) 13:19:35 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x4100) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000100)) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000700400000000000000000000000000000000000050020000a0030000a0030000a0030000a0030000a003000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200160010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000000004d4000004d5fd0b00008003000028006d6800000000000000000000000000000000000000000000000000000000090401000000000040005443504f5054535452495000000000000000000000000000000000000000030000001f000000fd070000010000000800000000000000ff0300000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000600100000000000000000000000000000000000000000001fe8000000000000000000000000000bbff000000ff0000ffffffffffffffff00ffffffffffffff00ffffffff0000000076657468305f746f5f68737200000000687773696d30000000000000f9b2a800000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000067000201080000000000000000000000000000002801500100000000000000000000000000000000000000000000000030007372680000000000000000000000000000000000000000000000000000006c020909020004200100000000000000300073726800000000000000000000000000000000000000002000000000000000090700018001039400000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d00000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000000e26c72dbea4eae5e3f16bb8ed922e83e9dffa2d3e07d0665765cd8c52547320a22ad3f0520174bb63a5452f915c7930e52d4e18c3d43851a934234bcc99ae6933852e9bd31d902bda20af6ed7d4625993990f9645dfba5106f9761f4fefb4a3a94e9ecce490e6879adac3e8421ad7691e9fd5a25b80ef35f99202a5985b30c0655cb25d68c8de3542f2c6b3329005fc24319f5a6a39bb74118e00000000000000"], 0x4d0) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:35 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x800, 0xa002) r1 = gettid() ptrace$getregs(0xc, r1, 0x3, &(0x7f0000000000)=""/26) r2 = openat$cgroup_ro(r0, &(0x7f0000000240)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) sendto$rxrpc(r0, &(0x7f00000000c0)="157f42c16a24b299fff733e0f16143ff255efb8f632006", 0x17, 0x20000000, &(0x7f0000000100)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x24) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000040)={'dummy0\x00', 0x9}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) 13:19:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:36 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) 13:19:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) 13:19:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) [ 303.746543][ T29] device bridge_slave_1 left promiscuous mode [ 303.754104][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.789142][ T29] device bridge_slave_0 left promiscuous mode [ 303.796054][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.827411][ T29] device hsr_slave_0 left promiscuous mode [ 304.867146][ T29] device hsr_slave_1 left promiscuous mode [ 304.912979][ T29] team0 (unregistering): Port device team_slave_1 removed [ 304.924687][ T29] team0 (unregistering): Port device team_slave_0 removed [ 304.935083][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 304.980068][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 305.058577][ T29] bond0 (unregistering): Released all slaves [ 305.162631][T19563] IPVS: ftp: loaded support on port[0] = 21 [ 305.226560][T19563] chnl_net:caif_netlink_parms(): no params data found [ 305.255678][T19563] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.262945][T19563] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.270504][T19563] device bridge_slave_0 entered promiscuous mode [ 305.278286][T19563] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.286174][T19563] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.293996][T19563] device bridge_slave_1 entered promiscuous mode [ 305.352540][T19563] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.363577][T19563] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.390068][T19563] team0: Port device team_slave_0 added [ 305.397381][T19563] team0: Port device team_slave_1 added [ 305.479421][T19563] device hsr_slave_0 entered promiscuous mode [ 305.537296][T19563] device hsr_slave_1 entered promiscuous mode [ 305.597157][T19563] debugfs: Directory 'hsr0' with parent '/' already present! [ 305.614211][T19563] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.621337][T19563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.628758][T19563] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.635843][T19563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.676066][T19563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.691572][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.700990][T10222] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.711581][T10222] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.724518][T19563] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.735710][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.744331][T10222] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.751423][T10222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.767585][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.775924][T10222] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.783015][T10222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.791354][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 305.800303][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 305.812404][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.822691][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.835156][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.844541][T19563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.868182][T19563] 8021q: adding VLAN 0 to HW filter on device batadv0 13:19:39 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) 13:19:39 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x9, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000004c0)="a3a4ef2d40a3d82fad0776547a9b1303c48aa4e30a84e786df4fa2519192afc95e218b096c8524b3f768265b1b6e6683cc45737e928b610293e6eeb62ba5bccc69ceb919c3ff24907dc0a52332dea79807cd6707a5f5870b9fd252b77d170d83913c50e633f51b45b70db2efdfd588b08a504d35cffb4273678bf35dc5b546e148efd28721411017ee98b4ad2b9f6f1bf4") execve(&(0x7f0000000040)='./bus\x00', &(0x7f0000000300)=[&(0x7f0000000080)='/dev/radio#\x00', &(0x7f0000000200)='/dev/radio#\x00', &(0x7f0000000240)='/dev/radio#\x00', &(0x7f0000000280)='-\x00', &(0x7f00000002c0)='/dev/radio#\x00'], &(0x7f0000000440)=[&(0x7f0000000340)='bdevppp0\x00', &(0x7f0000000380)='/dev/radio#\x00', &(0x7f00000003c0)='em1:bdev.\x00', &(0x7f0000000400)='\x00']) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) pread64(r2, &(0x7f0000000100)=""/245, 0xf5, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) 13:19:39 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 305.957218][T19571] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:39 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000940)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000980)=[{0xffff, 0x200, 0x1c00000000, 0x6, @tick=0x2, {0x8ff, 0x4}, {0x5833}, @raw8={"de70808b8d8c1243dc7ec1c5"}}, {0x7f, 0x7, 0xe50, 0xffffffffffffffe0, @time={0x77359400}, {0x8000, 0x3}, {0x5, 0x4}, @raw32={[0xcd5, 0x1, 0x7]}}, {0x8, 0x3f, 0x8, 0x3, @time={r1, r2+10000000}, {0x80000000, 0x93a}, {0x4, 0xd0}, @note={0xff, 0x5, 0xff, 0x100, 0x2d86fbf3}}, {0x7, 0xfffffffffffffffb, 0xd2, 0x47, @time, {0x9, 0x1000}, {0x5, 0x1}, @connect={{0x8, 0x401}, {0xcf7, 0x2}}}], 0xc0) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000a40)=0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000a80)={[], 0x8001, 0x0, 0x8, 0x5, 0x38b, r4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKBSZSET(r3, 0x40081271, &(0x7f0000000380)=0xffff) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000340)) r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xa00000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c0100e2002d0008002bbd7000fcdbb91a000000", @ANYRES32=r7, @ANYBLOB="0000ffff0f00f1ff0900060008000b0000010000080005000308000008000100753332000c00020008000300390c0000080005000007000008000500000700000c0001007463696e64657800c00002000800040000000000ac000700a800140000000c000100736b6265646974000c00020008000300f3ff0f008800060092a8e92a0b322413c46e05fa98cb1a2194799ac84f7b61142eb7ee71d92db1a402f77e7b319b87993c64551a6c9ffe10277fe5d5b78042b751295bcb00fd414a981f4b803e13e8a723513248ce429a6d65303b4c1bc8b3acf8255c0ab34e21c98a0f73d2f03c7db3734832b6eda47149d5c001d3a584149fec3c3525e4b452420e5b0000000000080002000000000008000b00060000"], 0x12c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) setsockopt$inet6_tcp_buf(r3, 0x6, 0x1c, &(0x7f00000006c0)="b1f815ed0f132d01e1f6fc47f444a95fa7346f55eca470563e5f85fe40ccd97adf2c194f057669eda1ffdf3c28dc3ce572943896866492704ba4e0ed3454dcb91bdcab2a24669d1d39f2fdf1f61450ba1c488458e8b42a21851a1fd1b9affaec23be7c7d36824a5b70f28536c8b5d05e970721f50aaa19284de511a6cd99ad4001436efdebb2b50fc86d38308d3060603aa86b9dc39b89dc5f3876029279d998a49b4c1f86ee209746aea2b9a4b860d8f78c3506471ebb797c34cd28d9d3542284677a2583b9fe", 0xc7) ioctl$VHOST_SET_VRING_BASE(r6, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000000800)=ANY=[@ANYBLOB="04000000000000000000030000000000220088000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00]\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB], @ANYBLOB="00000000000000000020000000000000ec000000000000", @ANYPTR, @ANYBLOB="00000000000000000000000000000000d400b5fee368ba3ed8b9ea032a68dcdaf14f57ce729aa3b05c34acf26af5c2bd073196c58b8950888bfdb38e3a026c66ffd9eb97d290713df5e84d9146a75efcf11bd06d20a47a29e311ab758bdae2c2dd58c495148c4b00a608b616fa87e5cebc17bbbfa4157e1cdf64d74929c921112520edbd383bdcb5fa890711d9bea5ed716051ae9fcfa253e3a229efeb4ac4d6dc749d6592309e1339dd0ef5cf9578543468513b56ebffb06aa3909bbdb03441b9d8ca4751d2", @ANYBLOB='\x00\x00\x00\x00']) socket(0x1e, 0x0, 0x0) ioctl$IMADDTIMER(r3, 0x80044940, &(0x7f0000000000)=0xf4240) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r8, 0x80086601, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f00000007c0)='/dev/vcsa#\x00', 0x80, 0x10080) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x8e, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000000440)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) openat$cgroup_procs(r8, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) r9 = fsopen(&(0x7f0000000040)='cgroup\x00', 0x1) fcntl$F_GET_FILE_RW_HINT(r9, 0x40d, &(0x7f0000000280)) 13:19:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) 13:19:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 13:19:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) 13:19:39 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) r1 = socket$inet(0x2, 0xffffffffffffffff, 0x80000003) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0xf91, 0x4) sendto$inet(r1, 0x0, 0x0, 0x4090, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) close(r1) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000280)=0x7f, 0x4) r2 = geteuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f0000001400)='./file0\x00', 0x2000, 0x102) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001500)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) sendmsg$nl_route_sched(r4, &(0x7f00000016c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x10080}, 0xc, &(0x7f0000001680)={&(0x7f0000001640)=ANY=[@ANYBLOB="24000000110001002abd70170000000000000000", @ANYRES32=r5, @ANYBLOB="090000000f0001000e000900"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) r6 = syz_open_dev$sg(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, 0x0) unlink(&(0x7f0000001780)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000001440)={0xf2, 0x0, 0x0, 0x20}) pipe(&(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r8, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000002980)=ANY=[@ANYRES16, @ANYPTR64=&(0x7f0000002940)=ANY=[@ANYPTR64, @ANYRESDEC], @ANYRESHEX=0x0], @ANYPTR=&(0x7f00000029c0)=ANY=[@ANYRES16=r5, @ANYRES32=r6, @ANYRESOCT=r5, @ANYRESHEX=0x0], @ANYBLOB="5f311386263d297e0c0f5b653a31d4662820a0b1752072f5daf4dbed0826e16da78ffdc70697c7ff929c7b60e34d93401e23b64b5fc9f0a1c2ec4fe3b96e417854a533fa6933a445a45f174ef96370876210d10b301c82d138c0c4105de27753ab431bd3320faffb351812b650c6fd19375cdd2797d24ed56115eb2ae134520a83d8d29ca8d36752e54b68376f79bbbbdb517777c915f1ee2e403e08ed2e9e8728aeffcb799efef3ae7bbea934ca39da514e7e3cb33f1f2f4aa03337a91e", @ANYRES64=r3, @ANYRES32=r7, @ANYBLOB="edfd72bf6b8ada1bb6832d1e6805b65b921cb5471e4340aa9b3f06d78ba5d268dd6d9977148857988eecf78e80c41f451a1bc3eac44562f34ec844f02fd6a8c9491c083db6ee07a267fa284a3ad295710c5dfa55cb96d9d6c2573f6450e125180bfa2d3a15579025626c1a4d22ba2d1a64121f5d85dc276e70b918ccd217dd7421ed6f2a7c012cf68aafd2e1093d20092016da4c96bad706e2123400a9d272b1d7dc6b4369a8927483f1610bf82777d65cf8d6459f686aecd57354f57d1947a4e35bf7eb245c14285b43e55411197489a07653f634de31ea50", @ANYRESOCT=r8, @ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000002c00)=ANY=[@ANYRESHEX=r8, @ANYRESOCT=r3]], &(0x7f0000001340)=0xa) setresuid(r2, r3, 0x0) 13:19:39 executing program 0: 13:19:39 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:39 executing program 0: 13:19:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) fsync(r0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000000c0)={0x9, {{0x2, 0x4e22, @multicast2}}}, 0x88) 13:19:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x7, 0x4) 13:19:39 executing program 3: setreuid(0x0, 0xee00) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x410000, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) mount$9p_unix(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x4000, &(0x7f0000000340)={'trans=unix,', {[{@access_user='access=user'}, {@noextend='noextend'}], [{@obj_type={'obj_type', 0x3d, '/dev/full\x00'}}, {@uid_gt={'uid>', r1}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_gt={'fowner>', r2}}, {@obj_user={'obj_user', 0x3d, 'trusted'}}]}}) r3 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r3, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)=0x1) clone(0x80000080050ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:19:39 executing program 2: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:39 executing program 0: 13:19:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x7, 0x4) 13:19:39 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:39 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x81, 0x40100) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, &(0x7f00000000c0)=0x4) r1 = openat$cgroup_ro(r0, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000200)) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x11, 0x2, 0x8}, 0x9}}, 0x18) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x200, 0xf, 0x2, 0x4, "7c0a563c85bcd4140a75445db2a667ff6e814e7edea018fd62dbc07e0e48b13c82c7778936f9df6575dcedf90a904aa79d81bff39dbda7816beb3d51f450d5b7", "977c3992ed5c05b58fb1b871c2ca6809a8734dfd4d44497d330d6ad21e8381df", [0x6, 0x401]}) 13:19:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x7, 0x4) 13:19:40 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x89ede87d7581ec75, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000080)={0x5, 0x7, r2, 0x0, r0, 0x0, 0x3, 0x101}) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:40 executing program 0: 13:19:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, 0x0) 13:19:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cg\xb7oup/syz0\x05\x00\x00\x00\x00\x00\x00\x00\x111z\x87<9\x17\x18\x96U\xb4K]y\xd1\x00Y\x11Q\xf4\xaa;\xdd\xd6\xf3\xae(\x0e;\xd8w\v\xb7\x1b\xde\x02DV\x88\xeb\xe1\x1c,\xda\xf66*:\x85\x0erl\x8a\xa0\xec\x83C\xf3\xc31\xb9\xde\x19Q\xd3\x98\x97ol\xb7Yp_)G\x1e\x01\xc7\xd9a\xc9\xa1\xe8\xad\xd0U\xe0k\xec\x1e\xde\x9c\x00\x00A$\n2\xd5t\xbc\xb3\xc4\x00\xd3g]\x8a\xb3\x03\x18dI\xac\xe9\xf9\xdc\x1cRm\xf4\x81\xb9\x1d\xa5:', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xede\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x90\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc9\f7M\t\x00B\xa1\xc2\xe9\xd3\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\x05\xe1V\x1c\x9161\x92\'\xff\xd12\x1f\xc8\xc4\x98[\xe42\x84-w\xa9*\xb6\x13\xb2\x85\x90\xf3\\\x9a\xd5\x19\x00\x00\x00\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x1, @loopback}, 0x1c) 13:19:40 executing program 0: 13:19:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, 0x0) 13:19:40 executing program 2: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:40 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xca, 0x800) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f00000000c0)={0x5e, "2d82bb1582704db8068ccc0e7803042768653ba92195e6bd3f2bb10a752f24d8b05c55a336d222d81858c9a04fb1988a541571d37fec24dd39d393f6bd012690302fd24ba4502e718ab16af6c0290bed69aa1e58562d2cc3c5acc5965b2ad41c2c40cb64e6a386fac468c648e21820c64de8534346ad9cede4b275c3eb82bb0c"}) accept4$unix(r0, 0x0, &(0x7f0000000040), 0x800) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) 13:19:40 executing program 0: [ 308.247559][ T21] device bridge_slave_1 left promiscuous mode [ 308.253784][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.307598][ T21] device bridge_slave_0 left promiscuous mode [ 308.313792][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.377395][ T21] device hsr_slave_0 left promiscuous mode [ 309.437055][ T21] device hsr_slave_1 left promiscuous mode [ 309.484043][ T21] team0 (unregistering): Port device team_slave_1 removed [ 309.495443][ T21] team0 (unregistering): Port device team_slave_0 removed [ 309.505487][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 309.561458][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 309.624940][ T21] bond0 (unregistering): Released all slaves [ 309.723951][T20076] IPVS: ftp: loaded support on port[0] = 21 [ 309.792909][T20076] chnl_net:caif_netlink_parms(): no params data found [ 309.874853][T20076] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.882630][T20076] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.894717][T20076] device bridge_slave_0 entered promiscuous mode [ 309.902929][T20076] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.914276][T20076] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.924633][T20076] device bridge_slave_1 entered promiscuous mode [ 309.954923][T20076] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.966209][T20076] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 309.994485][T20076] team0: Port device team_slave_0 added [ 310.005164][T20076] team0: Port device team_slave_1 added [ 310.081273][T20076] device hsr_slave_0 entered promiscuous mode [ 310.137333][T20076] device hsr_slave_1 entered promiscuous mode [ 310.196956][T20076] debugfs: Directory 'hsr0' with parent '/' already present! [ 310.220619][T20076] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.227747][T20076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.235101][T20076] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.242212][T20076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.284934][T20076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.298605][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.307173][T10222] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.314527][T10222] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.325824][T20076] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.335339][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.343892][T10222] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.350969][T10222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.361504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.372992][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.380087][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.411962][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 310.430480][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 310.440716][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 310.459705][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.468204][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.478702][T20076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 310.500413][T20076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 310.583356][T20083] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:19:43 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:43 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, 0x0) 13:19:43 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x3, 0x0) lseek(r0, 0x43, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x9c\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4G\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vU5\x11\b\rw\x98D\xe9z\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef\x00\x00\x00\x00\x00\x00\x00\x0e\x84P\xca\x14o\xc1\xd5\xb1\xeeP\xd6\xb0|t\xf8\xd8qBE\xd3\x8b\xd9\xb8\xa7\v}\xae*\x14\xbd\xb4\x98J)\x92\x86Q\xd7\xeb\x86-_\xb2\x98)\x02\x88\xb7\xd6\bWx\xc4\nK&\xcc\xcb\xe7\x11\x15\xaa-\xbb\xf5\x88\xca=*\xed1\xd3#\xab\a!\xae\x02\xeb\x02Ou]D2t\x00W\xf7x \xee\xfe\x1b\x05\xa7\x05\x90\x01\xf3Vcc\x1d\x1bHr\f\xa8\x99e%!\xef}\x92Q\xec\f\xf8g\x87o\xbf\x0eK\x8a\x97\xf6]Fs\x1eO\x8a,\x1a\xbdQ\xfc\xc7\xd18.\xd9\n=\xd7\xc8\xd6\xb1\x10VD\xffa\xb9\x9b\xef\xe4s\x96i Z4\f\xca\x02*\xbfF\xf1n\xbc\xd7\xc5\\\xbe-\xdf\xca\x85\x00c\xf6\x87\xfaW\t\x9cX\x9fE80\xc5Xt*&\xa4\x06\xe1\xb1\x1cc\x8c\x8c\x88\xcb\xc6\xddRH%>`', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc08c5102, &(0x7f0000000180)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x240000, 0x0) 13:19:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffff53, {r1}}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000180)}) 13:19:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040), 0x4) 13:19:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000000900)={{0x0, 0x400, 0x7642, 0x27b, 0x2e5, 0xfffffffffffffffe, 0x1a9, 0x3}, "db209d36e47a2365ca34c998295b446e4746994d56b1c26fdf6e0e54a15700685c1312ff8bc8867394a7429c7031730bf8072182e4a67f497c0b3a7a229cf1305c039024c26cbf762377f39155677291ad8e775a8b15b206edae626dace78f34dc73083c3d36b9d1f2be60e074fe3f32154cf5ab59527b2e055ab52f36412b4a857a2609093bf95ad045ded444fc5c0fdee02938521e26f0b16f756609c4fadde64156e759ce1b6456afab3e88544eba1485299ceb8480875c8df1eb1289ff96413d8141d833b63e82473b80d4b7414684d86aeff446071d2b5de82288e5ad20bbba50bab75670c7a491e8c8cc26d2de1a1bc120920e6d89444fdb2f", [[], [], [], [], [], [], [], []]}, 0x91c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 13:19:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = dup(r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x1b, 0x0, 0x0, @ipv4={[], [], @local}}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 13:19:44 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:44 executing program 2: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:44 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x2200, 0x0) epoll_pwait(r0, &(0x7f0000000300)=[{}, {}, {}], 0x3, 0x1, &(0x7f0000000340)={0x1}, 0x8) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x40, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000180)=0x1, 0x4) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000140)=0x1) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000000c0)={0x0, 0x7, 0x1000, [], &(0x7f0000000040)={0x0, 0x5, [], @ptr=0x7}}) prctl$PR_SET_FPEMU(0xa, 0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n\x01\x00\x00\x00y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x16\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03L\x10wz0dtF\xfbn9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\t\x00B\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef', 0x0, 0x0) ioctl(r2, 0x8, &(0x7f00000001c0)="7629e7fca2c2c5b9be6b7e95cdcbb5ec507928507121b2d5fdcf45bd76eb4b855a18644a0c5cf1e8730ce0093299dcc67a09f8") r4 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x8, 0x8000) ioctl$KVM_SET_TSS_ADDR(r4, 0xae47, 0xd000) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000080)) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x400200, 0x0) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000240)) 13:19:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040), 0x4) 13:19:44 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:44 executing program 0: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040), 0x4) 13:19:44 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:44 executing program 3: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:44 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:44 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:44 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:44 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_ifreq(r0, 0x8997, &(0x7f0000000000)={'veth1_to_team\x00', @ifru_flags=0x500}) setreuid(0x0, 0xee00) r1 = geteuid() setreuid(r1, r1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000180)={'`\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdcP\x00', 0x5}) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000006b9c2f4e2d7ccb22c29b437ea3741161630204b2d3232ef25d9cb068f14e0a8ff00ca7dbba8073fd39b9a689ad10d758dcf6add8590153796da7d747cb9a9ec781f5c7c8337c8cc417a988dd735de9a0251cb7bb21e96a924d5b4bd5663796d0e680890573446796148bfe9efd90c10a749079dd0ff79e93227ee0581ac53ff1ae81f18d90892175d6562a5b2764649fcc"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) setreuid(r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:45 executing program 0: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:45 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:45 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:45 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:45 executing program 0: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:45 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:46 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:46 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 312.987820][ T21] device bridge_slave_1 left promiscuous mode [ 312.994053][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.067996][ T21] device bridge_slave_0 left promiscuous mode [ 313.074276][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 13:19:46 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:46 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 314.357519][ T21] device hsr_slave_0 left promiscuous mode [ 314.417028][ T21] device hsr_slave_1 left promiscuous mode [ 314.462246][ T21] team0 (unregistering): Port device team_slave_1 removed [ 314.473347][ T21] team0 (unregistering): Port device team_slave_0 removed [ 314.483162][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 314.530549][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 314.619328][ T21] bond0 (unregistering): Released all slaves [ 315.458968][T20611] IPVS: ftp: loaded support on port[0] = 21 [ 315.534477][T20611] chnl_net:caif_netlink_parms(): no params data found [ 315.559128][T20611] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.566704][T20611] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.574733][T20611] device bridge_slave_0 entered promiscuous mode [ 315.582266][T20611] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.589600][T20611] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.598131][T20611] device bridge_slave_1 entered promiscuous mode [ 315.614144][T20611] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.625296][T20611] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.643741][T20611] team0: Port device team_slave_0 added [ 315.651136][T20611] team0: Port device team_slave_1 added [ 315.718527][T20611] device hsr_slave_0 entered promiscuous mode [ 315.787423][T20611] device hsr_slave_1 entered promiscuous mode [ 315.827059][T20611] debugfs: Directory 'hsr0' with parent '/' already present! [ 315.861480][T20611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.873249][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.881926][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.893139][T20611] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.902956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.912245][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.921700][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.929265][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.937878][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.947936][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 315.957849][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.966818][ T2421] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.974368][ T2421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.992845][T20611] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 316.005458][T20611] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 316.018095][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 316.027366][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 316.038030][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 316.046589][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.056150][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 316.064724][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.073410][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.082283][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.091395][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.100009][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.109136][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.117383][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 316.132880][T20611] 8021q: adding VLAN 0 to HW filter on device batadv0 13:19:49 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:49 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:49 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:49 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:49 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:49 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:49 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:49 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:49 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:49 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 13:19:49 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:49 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:19:50 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:50 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:19:50 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:50 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:50 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:50 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:50 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:50 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r4, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:50 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:50 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:50 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000400)={r3, 0x81, 0x7f, 0xffffffffffffffe3}, 0x10) 13:19:50 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:50 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:50 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(r0, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(0xffffffffffffffff, r0, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:50 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x3f}, &(0x7f00000003c0)=0x8) 13:19:50 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:51 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 318.609106][ T21] device bridge_slave_1 left promiscuous mode [ 318.616262][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.657756][ T21] device bridge_slave_0 left promiscuous mode [ 318.664530][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.627633][ T21] device hsr_slave_0 left promiscuous mode [ 319.677118][ T21] device hsr_slave_1 left promiscuous mode [ 319.732281][ T21] team0 (unregistering): Port device team_slave_1 removed [ 319.744097][ T21] team0 (unregistering): Port device team_slave_0 removed [ 319.755884][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 319.780448][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 319.848949][ T21] bond0 (unregistering): Released all slaves [ 319.963199][T21164] IPVS: ftp: loaded support on port[0] = 21 [ 320.023708][T21164] chnl_net:caif_netlink_parms(): no params data found [ 320.053775][T21164] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.061248][T21164] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.069798][T21164] device bridge_slave_0 entered promiscuous mode [ 320.110002][T21164] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.117274][T21164] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.125218][T21164] device bridge_slave_1 entered promiscuous mode [ 320.151037][T21164] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 320.162306][T21164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 320.186341][T21164] team0: Port device team_slave_0 added [ 320.193754][T21164] team0: Port device team_slave_1 added [ 320.252518][T21164] device hsr_slave_0 entered promiscuous mode [ 320.337243][T21164] device hsr_slave_1 entered promiscuous mode [ 320.387095][T21164] debugfs: Directory 'hsr0' with parent '/' already present! [ 320.403925][T21164] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.411050][T21164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.418519][T21164] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.425584][T21164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.453539][T21164] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.468184][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.476720][ T3015] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.484913][ T3015] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.497450][T21164] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.508154][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.516520][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.523690][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.537706][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.546392][T10222] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.553528][T10222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.574929][T21164] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.586535][T21164] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.599041][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.608260][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.616536][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.625187][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.633586][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.641367][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.659901][T21164] 8021q: adding VLAN 0 to HW filter on device batadv0 13:19:53 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:53 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:53 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:53 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:53 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:53 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:54 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:54 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x10000) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:54 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x202000, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:54 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:54 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:54 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:54 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:54 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:54 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:54 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:54 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:54 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:54 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:54 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:54 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:55 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:55 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, r1) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:55 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:55 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:55 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, r1) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:55 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, r1) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:55 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, r1) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:55 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, r1) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:55 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:55 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() setreuid(0x0, 0x0) setreuid(r1, r1) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) [ 323.287761][ T21] device bridge_slave_1 left promiscuous mode [ 323.294096][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.347751][ T21] device bridge_slave_0 left promiscuous mode [ 323.353992][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.137506][ T21] device hsr_slave_0 left promiscuous mode [ 324.206957][ T21] device hsr_slave_1 left promiscuous mode [ 324.263019][ T21] team0 (unregistering): Port device team_slave_1 removed [ 324.273181][ T21] team0 (unregistering): Port device team_slave_0 removed [ 324.282432][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 324.340867][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 324.418050][ T21] bond0 (unregistering): Released all slaves [ 324.522830][T21467] IPVS: ftp: loaded support on port[0] = 21 [ 324.574597][T21467] chnl_net:caif_netlink_parms(): no params data found [ 324.604927][T21467] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.612140][T21467] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.619850][T21467] device bridge_slave_0 entered promiscuous mode [ 324.627531][T21467] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.634611][T21467] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.642531][T21467] device bridge_slave_1 entered promiscuous mode [ 324.661317][T21467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.672165][T21467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 324.690460][T21467] team0: Port device team_slave_0 added [ 324.750980][T21467] team0: Port device team_slave_1 added [ 324.832254][T21467] device hsr_slave_0 entered promiscuous mode [ 324.897226][T21467] device hsr_slave_1 entered promiscuous mode [ 324.936933][T21467] debugfs: Directory 'hsr0' with parent '/' already present! [ 324.954550][T21467] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.961673][T21467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.969059][T21467] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.976124][T21467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.004184][T21467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.014861][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.023108][T10222] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.031079][T10222] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.042655][T21467] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.053951][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.063400][ T2421] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.070495][ T2421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.098984][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.107823][ T2421] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.114900][ T2421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.124073][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.133077][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.141979][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.150626][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.160481][T21467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 325.168999][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.184787][T21467] 8021q: adding VLAN 0 to HW filter on device batadv0 13:19:58 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:58 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:58 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:58 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:58 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:58 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:19:58 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:58 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:58 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r1}, {0x2, 0x2, r1}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:58 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) r1 = geteuid() mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r1, r1) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:58 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:58 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6}, {0x2, 0x2}, {0x2, 0x2}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:19:59 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:19:59 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:19:59 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6}, {0x2, 0x2}, {0x2, 0x2}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) [ 326.787557][ T21] device bridge_slave_1 left promiscuous mode [ 326.793745][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.867477][ T21] device bridge_slave_0 left promiscuous mode [ 326.873666][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.657460][ T21] device hsr_slave_0 left promiscuous mode [ 327.697172][ T21] device hsr_slave_1 left promiscuous mode [ 327.771683][ T21] team0 (unregistering): Port device team_slave_1 removed [ 327.782957][ T21] team0 (unregistering): Port device team_slave_0 removed [ 327.792832][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 327.841104][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 327.918380][ T21] bond0 (unregistering): Released all slaves [ 328.048203][T21516] IPVS: ftp: loaded support on port[0] = 21 [ 328.106011][T21516] chnl_net:caif_netlink_parms(): no params data found [ 328.133904][T21516] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.141086][T21516] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.148974][T21516] device bridge_slave_0 entered promiscuous mode [ 328.156446][T21516] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.163730][T21516] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.171513][T21516] device bridge_slave_1 entered promiscuous mode [ 328.185468][T21516] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 328.196170][T21516] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 328.215405][T21516] team0: Port device team_slave_0 added [ 328.222124][T21516] team0: Port device team_slave_1 added [ 328.339531][T21516] device hsr_slave_0 entered promiscuous mode [ 328.390157][T21516] device hsr_slave_1 entered promiscuous mode [ 328.477272][T21516] debugfs: Directory 'hsr0' with parent '/' already present! [ 328.493884][T21516] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.501007][T21516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.508389][T21516] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.515465][T21516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.543114][T21516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.554405][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.563254][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.571587][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.589841][T21516] 8021q: adding VLAN 0 to HW filter on device team0 [ 328.603788][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.616439][T10222] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.623660][T10222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.644548][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.653199][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.660308][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.677988][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 328.686539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 328.695856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.704385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.713030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 328.721707][T21516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 328.738454][T21516] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 328.888530][T21523] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:02 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:02 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:02 executing program 5: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:02 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:02 executing program 0: setreuid(0x0, 0xee00) r0 = open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000500)=0x6) setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6}, {0x2, 0x2}, {0x2, 0x2}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:02 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:02 executing program 5: setreuid(0x0, 0xee00) open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:02 executing program 0: setreuid(0x0, 0xee00) open(&(0x7f0000000240)='./bus\x00', 0x2, 0x40) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:02 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:02 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:02 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:02 executing program 5: r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:02 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) tkill(r1, 0x5000000000014) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:03 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:03 executing program 0: r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) [ 330.458205][ T21] device bridge_slave_1 left promiscuous mode [ 330.464594][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.527670][ T21] device bridge_slave_0 left promiscuous mode [ 330.533829][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.347347][ T21] device hsr_slave_0 left promiscuous mode [ 331.407050][ T21] device hsr_slave_1 left promiscuous mode [ 331.461898][ T21] team0 (unregistering): Port device team_slave_1 removed [ 331.472983][ T21] team0 (unregistering): Port device team_slave_0 removed [ 331.482665][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 331.520055][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 331.587468][ T21] bond0 (unregistering): Released all slaves [ 331.709064][T21780] IPVS: ftp: loaded support on port[0] = 21 [ 331.768294][T21780] chnl_net:caif_netlink_parms(): no params data found [ 331.791219][T21780] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.798434][T21780] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.805978][T21780] device bridge_slave_0 entered promiscuous mode [ 331.813682][T21780] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.820804][T21780] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.828469][T21780] device bridge_slave_1 entered promiscuous mode [ 331.901489][T21780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 331.912449][T21780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 331.933672][T21780] team0: Port device team_slave_0 added [ 331.941181][T21780] team0: Port device team_slave_1 added [ 332.009421][T21780] device hsr_slave_0 entered promiscuous mode [ 332.047211][T21780] device hsr_slave_1 entered promiscuous mode [ 332.106933][T21780] debugfs: Directory 'hsr0' with parent '/' already present! [ 332.127081][T21780] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.134192][T21780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.141574][T21780] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.148695][T21780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.188358][T21780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.201193][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.209921][ T3015] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.217916][ T3015] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.230007][T21780] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.241132][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.249839][ T3015] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.256939][ T3015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.279490][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.288940][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.296001][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.304743][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.314081][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.323081][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.332602][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.344276][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.354395][T21780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.370859][T21780] 8021q: adding VLAN 0 to HW filter on device batadv0 13:20:05 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:05 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:05 executing program 5: r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:05 executing program 0: r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:05 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:05 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:05 executing program 5: r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:05 executing program 0: r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:05 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(0x0, 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:05 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(0x0, 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:05 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:05 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(0x0, 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:06 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(0x0, 0x8, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:06 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:06 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(0x0, 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:06 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(r0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:06 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:06 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:06 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:06 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:06 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(0x0, 0x8, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:06 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:06 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(r0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:06 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:06 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:07 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:07 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:07 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:07 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:07 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 334.698321][ T21] device bridge_slave_1 left promiscuous mode [ 334.704639][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.747705][ T21] device bridge_slave_0 left promiscuous mode [ 334.753952][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.497696][ T21] device hsr_slave_0 left promiscuous mode [ 335.577095][ T21] device hsr_slave_1 left promiscuous mode [ 335.622866][ T21] team0 (unregistering): Port device team_slave_1 removed [ 335.634242][ T21] team0 (unregistering): Port device team_slave_0 removed [ 335.644161][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 335.680677][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 335.741158][ T21] bond0 (unregistering): Released all slaves [ 335.853368][T21893] IPVS: ftp: loaded support on port[0] = 21 [ 335.916442][T21893] chnl_net:caif_netlink_parms(): no params data found [ 335.947005][T21893] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.954154][T21893] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.962003][T21893] device bridge_slave_0 entered promiscuous mode [ 335.969575][T21893] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.976657][T21893] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.984336][T21893] device bridge_slave_1 entered promiscuous mode [ 336.002358][T21893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 336.013046][T21893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 336.031393][T21893] team0: Port device team_slave_0 added [ 336.038166][T21893] team0: Port device team_slave_1 added [ 336.139533][T21893] device hsr_slave_0 entered promiscuous mode [ 336.187309][T21893] device hsr_slave_1 entered promiscuous mode [ 336.237014][T21893] debugfs: Directory 'hsr0' with parent '/' already present! [ 336.259626][T21893] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.266757][T21893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.274161][T21893] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.281261][T21893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.327998][T21893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.340504][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.349811][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.357617][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.369025][T21893] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.379044][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.387566][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.394602][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.404901][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.413561][ T2421] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.420646][ T2421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.439762][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 336.449632][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 336.464653][T21893] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 336.475235][T21893] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 336.488746][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 336.496680][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.505556][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.517734][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 336.541156][T21893] 8021q: adding VLAN 0 to HW filter on device batadv0 13:20:09 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:09 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:09 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:09 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:09 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:09 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:10 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:10 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:10 executing program 5: setreuid(0x0, 0xee00) geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 13:20:10 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:11 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(0x0, &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:11 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', 0x0, &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:11 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:11 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:11 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:11 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', 0x0, &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:11 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(0x0, &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:11 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', 0x0, &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:11 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:11 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(0x0, &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) [ 338.767813][ T21] device bridge_slave_1 left promiscuous mode [ 338.774045][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.830140][ T21] device bridge_slave_0 left promiscuous mode [ 338.836475][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.587594][ T21] device hsr_slave_0 left promiscuous mode [ 339.637013][ T21] device hsr_slave_1 left promiscuous mode [ 339.681786][ T21] team0 (unregistering): Port device team_slave_1 removed [ 339.692852][ T21] team0 (unregistering): Port device team_slave_0 removed [ 339.702896][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 339.741601][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 339.817765][ T21] bond0 (unregistering): Released all slaves [ 339.913951][T21976] IPVS: ftp: loaded support on port[0] = 21 [ 339.970618][T21976] chnl_net:caif_netlink_parms(): no params data found [ 339.996797][T21976] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.004086][T21976] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.011770][T21976] device bridge_slave_0 entered promiscuous mode [ 340.019579][T21976] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.026645][T21976] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.034224][T21976] device bridge_slave_1 entered promiscuous mode [ 340.049983][T21976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 340.060721][T21976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 340.077342][T21976] team0: Port device team_slave_0 added [ 340.083936][T21976] team0: Port device team_slave_1 added 13:20:13 executing program 4: unshare(0x400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000100)=""/33, 0x259}], 0x10a3, 0x0) 13:20:13 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 13:20:13 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:13 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:13 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 340.129372][T21976] device hsr_slave_0 entered promiscuous mode 13:20:13 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) [ 340.176954][T21976] device hsr_slave_1 entered promiscuous mode [ 340.223654][T21976] debugfs: Directory 'hsr0' with parent '/' already present! [ 340.306005][T21976] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.313156][T21976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.320559][T21976] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.327662][T21976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.465801][T21976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 340.491332][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.501774][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.510954][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.525681][T21976] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.537548][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.546191][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.553327][T10224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.572734][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.581423][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.589534][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.614327][T21976] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 340.625318][T21976] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 340.639300][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 340.648754][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 340.657519][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.665991][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.685974][T21976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 340.694214][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 340.703943][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 340.849887][T22007] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:20:14 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:14 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:14 executing program 4: gettid() perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000180)={r0}, &(0x7f0000000600)=""/4096, 0x1000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000240)={0xffffffffffffffbc, 0x0}) 13:20:14 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x2) 13:20:14 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:14 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:14 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x44, 0x2) 13:20:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x24, &(0x7f0000000200)) 13:20:14 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0xffffffff7fffffff, 0x8}]}, 0x14, 0x3) 13:20:14 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x3) 13:20:14 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:14 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x6, r0}, {0x2, 0x2, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x3c, 0x2) 13:20:14 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:14 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x6, r0}], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x34, 0x2) 13:20:14 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x3) 13:20:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66426c61308be7c0783205000000000000001f0018000000000001005bd0efd28db006a924c955c39a4301"], 0x30) 13:20:14 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:15 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:15 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x2c, 0x2) 13:20:15 executing program 4: prctl$PR_GET_NAME(0x10, &(0x7f0000000280)=""/215) gettid() perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b", 0xa4, 0xfffffffffffffffe) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000040)={'streebog256\x00'}}) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000240)={0xffffffffffffffbc, 0x0}) 13:20:15 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x3) 13:20:15 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:15 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:15 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}, {0x0, 0x8}]}, 0x14, 0x3) 13:20:15 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [], {}, [{0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x2c, 0x2) 13:20:15 executing program 4: prctl$PR_GET_NAME(0x10, &(0x7f0000000280)=""/215) gettid() perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b", 0xa4, 0xfffffffffffffffe) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000040)={'streebog256\x00'}}) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000240)={0xffffffffffffffbc, 0x0}) 13:20:15 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [], {}, [], {0x10, 0x4}, {0x20, 0x3}}, 0x24, 0x2) 13:20:15 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0xf14}]}, 0x14, 0x3) 13:20:15 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [], {}, [], {}, {0x20, 0x3}}, 0x24, 0x2) 13:20:16 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:16 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) 13:20:16 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2, 0x14, 0x3) 13:20:16 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 343.467637][ T21] device bridge_slave_1 left promiscuous mode [ 343.473828][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.528235][ T21] device bridge_slave_0 left promiscuous mode [ 343.534429][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.577352][ T21] device hsr_slave_0 left promiscuous mode [ 344.647050][ T21] device hsr_slave_1 left promiscuous mode [ 344.702802][ T21] team0 (unregistering): Port device team_slave_1 removed [ 344.712929][ T21] team0 (unregistering): Port device team_slave_0 removed [ 344.723604][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 344.749855][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 344.828678][ T21] bond0 (unregistering): Released all slaves [ 344.922820][T22125] IPVS: ftp: loaded support on port[0] = 21 [ 344.978275][T22125] chnl_net:caif_netlink_parms(): no params data found [ 345.007748][T22125] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.014864][T22125] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.022536][T22125] device bridge_slave_0 entered promiscuous mode [ 345.030371][T22125] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.037517][T22125] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.045029][T22125] device bridge_slave_1 entered promiscuous mode [ 345.061445][T22125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 345.072226][T22125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 345.091255][T22125] team0: Port device team_slave_0 added [ 345.100203][T22125] team0: Port device team_slave_1 added [ 345.158494][T22125] device hsr_slave_0 entered promiscuous mode [ 345.227306][T22125] device hsr_slave_1 entered promiscuous mode [ 345.266984][T22125] debugfs: Directory 'hsr0' with parent '/' already present! [ 345.317226][T22125] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.324319][T22125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.331890][T22125] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.338975][T22125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.389882][T22125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.403185][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.414675][ T2421] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.422462][ T2421] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.438475][T22125] 8021q: adding VLAN 0 to HW filter on device team0 [ 345.449932][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.458698][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.465763][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.494113][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.503091][T10222] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.510216][T10222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.525199][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.534492][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.553791][T22125] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 345.567425][T22125] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 345.582064][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.591217][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.602088][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.623352][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.633228][T22125] 8021q: adding VLAN 0 to HW filter on device batadv0 13:20:18 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:18 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x2) 13:20:18 executing program 5: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2, 0x14, 0x0) 13:20:18 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000280)=0xffffffffffffffff) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r1, 0x0, 0xffffffaf, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) sendto(r1, &(0x7f0000000080)="dc", 0x1, 0x0, 0x0, 0x0) 13:20:18 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:18 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 13:20:19 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) setreuid(0x0, r0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x0) 13:20:19 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r3+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40, &(0x7f0000001b80)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:19 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000280)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0xffffffaf, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000180)="dc", 0x1, 0x0, 0x0, 0x0) 13:20:19 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:19 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:19 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sysinfo(0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)='ip6tnl0\x00') 13:20:19 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 346.637809][T22183] net_ratelimit: 6 callbacks suppressed [ 346.637820][T22183] ip6tnl0: mtu less than device minimum 13:20:19 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() keyctl$invalidate(0x15, 0x0) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:19 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) [ 346.733049][T22185] ip6tnl0: mtu less than device minimum 13:20:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r3+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40, &(0x7f0000001b80)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:20 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r3+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40, &(0x7f0000001b80)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:20 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:20 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r3+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40, &(0x7f0000001b80)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:20 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:20 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r3+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40, &(0x7f0000001b80)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:20 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:20 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:21 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:21 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 348.748309][T22264] IPVS: ftp: loaded support on port[0] = 21 [ 348.774117][ T21] device bridge_slave_1 left promiscuous mode [ 348.781851][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.827821][ T21] device bridge_slave_0 left promiscuous mode [ 348.834017][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.837699][ T21] device hsr_slave_0 left promiscuous mode [ 349.907088][ T21] device hsr_slave_1 left promiscuous mode [ 349.954095][ T21] team0 (unregistering): Port device team_slave_1 removed [ 349.963892][ T21] team0 (unregistering): Port device team_slave_0 removed [ 349.975131][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 350.001414][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 350.093314][ T21] bond0 (unregistering): Released all slaves [ 350.235749][T22264] chnl_net:caif_netlink_parms(): no params data found [ 350.269715][T22264] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.276970][T22264] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.284688][T22264] device bridge_slave_0 entered promiscuous mode [ 350.292564][T22264] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.300021][T22264] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.308069][T22264] device bridge_slave_1 entered promiscuous mode [ 350.324718][T22264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 350.388585][T22264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 350.441541][T22264] team0: Port device team_slave_0 added [ 350.461790][T22264] team0: Port device team_slave_1 added [ 350.569622][T22264] device hsr_slave_0 entered promiscuous mode [ 350.701067][T22264] device hsr_slave_1 entered promiscuous mode [ 350.846960][T22264] debugfs: Directory 'hsr0' with parent '/' already present! [ 350.864753][T22264] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.871911][T22264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.879315][T22264] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.886428][T22264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.927412][T22264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 350.941571][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.951229][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.959789][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.972052][T22264] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.983140][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.004966][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.012132][T10224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.038794][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 351.048209][ T3015] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.055255][ T3015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.074683][T22264] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 351.085934][T22264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 351.099345][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 351.108250][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.116573][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.125027][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.134505][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 351.142276][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.160360][T22264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 351.282026][T22273] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:24 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:24 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r3+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40, &(0x7f0000001b80)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:24 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:24 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r3+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x40, &(0x7f0000001b80)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:24 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:24 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:24 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:24 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:25 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:25 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:25 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:25 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:25 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:25 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:25 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:25 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:25 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 353.508058][ T21] device bridge_slave_1 left promiscuous mode [ 353.514293][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.557672][ T21] device bridge_slave_0 left promiscuous mode [ 353.563850][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 13:20:27 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:27 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:27 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:27 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 354.887371][ T21] device hsr_slave_0 left promiscuous mode [ 354.927023][ T21] device hsr_slave_1 left promiscuous mode [ 354.973522][ T21] team0 (unregistering): Port device team_slave_1 removed [ 354.985165][ T21] team0 (unregistering): Port device team_slave_0 removed [ 354.995469][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 355.060366][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 355.144612][ T21] bond0 (unregistering): Released all slaves [ 355.245565][T22332] IPVS: ftp: loaded support on port[0] = 21 [ 355.245674][T22334] IPVS: ftp: loaded support on port[0] = 21 [ 355.482434][T22332] chnl_net:caif_netlink_parms(): no params data found [ 355.498009][T22334] chnl_net:caif_netlink_parms(): no params data found [ 355.578094][T22332] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.585221][T22332] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.598746][T22332] device bridge_slave_0 entered promiscuous mode [ 355.606480][T22334] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.618456][T22334] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.626488][T22334] device bridge_slave_0 entered promiscuous mode [ 355.639783][T22332] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.648177][T22332] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.656301][T22332] device bridge_slave_1 entered promiscuous mode [ 355.669233][T22334] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.676640][T22334] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.688585][T22334] device bridge_slave_1 entered promiscuous mode [ 355.735065][T22332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.752277][T22334] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.765824][T22332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.782564][T22334] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.831347][T22332] team0: Port device team_slave_0 added [ 355.842769][T22332] team0: Port device team_slave_1 added [ 355.851286][T22334] team0: Port device team_slave_0 added [ 355.862221][T22334] team0: Port device team_slave_1 added [ 355.931364][T22332] device hsr_slave_0 entered promiscuous mode [ 355.987412][T22332] device hsr_slave_1 entered promiscuous mode [ 356.026970][T22332] debugfs: Directory 'hsr0' with parent '/' already present! [ 356.079919][T22334] device hsr_slave_0 entered promiscuous mode [ 356.117379][T22334] device hsr_slave_1 entered promiscuous mode [ 356.157279][T22334] debugfs: Directory 'hsr0' with parent '/' already present! [ 356.175648][T22332] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.182812][T22332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.190217][T22332] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.197336][T22332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.214341][T22334] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.221486][T22334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.228865][T22334] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.236035][T22334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.317729][T22332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.328292][T10222] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.336288][T10222] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.344389][T10222] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.352143][T10222] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.374452][T22334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.384878][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.392823][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.406255][T22332] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.416344][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.425274][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.433900][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.442713][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.451029][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.458285][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.468311][T22334] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.477356][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.486009][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.494778][ T3015] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.501882][ T3015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.518939][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.529246][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.537946][T10224] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.545012][T10224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.553438][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.562316][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.571066][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.579356][T10224] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.587320][T10224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.597420][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.623079][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.632949][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.647623][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.656394][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.670735][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 356.680894][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.689524][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.698311][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.706760][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.715331][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.723714][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 356.732384][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.741048][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.749468][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.758459][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.766565][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.780105][T22334] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.791589][T22334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.804177][T22332] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.815498][T22332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.823217][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.833539][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.841872][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.850581][T10222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.878606][T22332] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 356.889326][T22334] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.024585][T22375] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:30 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:30 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:30 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:30 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:30 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:30 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:30 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:31 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:31 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:31 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:31 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:31 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:31 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:31 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:31 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) 13:20:31 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:32 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:32 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 359.537908][ T21] device bridge_slave_1 left promiscuous mode [ 359.544143][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.599301][ T21] device bridge_slave_0 left promiscuous mode [ 359.605619][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.647309][ T21] device hsr_slave_0 left promiscuous mode [ 360.688040][ T21] device hsr_slave_1 left promiscuous mode [ 360.754233][ T21] team0 (unregistering): Port device team_slave_1 removed [ 360.765780][ T21] team0 (unregistering): Port device team_slave_0 removed [ 360.778136][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 13:20:34 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:34 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:34 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) 13:20:34 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) [ 360.820231][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 360.946228][ T21] bond0 (unregistering): Released all slaves [ 361.129507][T22472] IPVS: ftp: loaded support on port[0] = 21 [ 361.304307][T22472] chnl_net:caif_netlink_parms(): no params data found [ 361.345800][T22472] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.354329][T22472] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.362703][T22472] device bridge_slave_0 entered promiscuous mode [ 361.371037][T22472] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.378704][T22472] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.386758][T22472] device bridge_slave_1 entered promiscuous mode [ 361.419871][T22472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 361.438766][T22472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 361.463313][T22472] team0: Port device team_slave_0 added [ 361.471507][T22472] team0: Port device team_slave_1 added [ 361.529547][T22472] device hsr_slave_0 entered promiscuous mode [ 361.568197][T22472] device hsr_slave_1 entered promiscuous mode [ 361.607107][T22472] debugfs: Directory 'hsr0' with parent '/' already present! [ 361.624965][T22472] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.632189][T22472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.639605][T22472] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.646704][T22472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.689187][T22472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.702802][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.711851][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.723966][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.739577][T22472] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.751709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.760570][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.767656][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.788002][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.797310][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.804526][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.813398][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.832218][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.841897][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.850783][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.859328][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.869151][T22472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.887564][T22472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.008994][T22502] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:35 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:35 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:35 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:35 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) 13:20:35 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:35 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:35 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:37 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:37 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:37 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:37 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)) 13:20:37 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:37 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:37 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 364.567904][ T21] device bridge_slave_1 left promiscuous mode [ 364.576581][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.632075][ T21] device bridge_slave_0 left promiscuous mode [ 364.643794][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 13:20:37 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) [ 364.728584][ T21] device bridge_slave_1 left promiscuous mode [ 364.741906][ T21] bridge0: port 2(bridge_slave_1) entered disabled state 13:20:38 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 13:20:38 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 364.820482][ T21] device bridge_slave_0 left promiscuous mode [ 364.828581][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.997424][ T21] device hsr_slave_0 left promiscuous mode [ 367.037470][ T21] device hsr_slave_1 left promiscuous mode [ 367.112948][ T21] team0 (unregistering): Port device team_slave_1 removed [ 367.125295][ T21] team0 (unregistering): Port device team_slave_0 removed [ 367.135056][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 13:20:40 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:40 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) [ 367.180801][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 367.260749][ T21] bond0 (unregistering): Released all slaves [ 367.391853][ T21] device hsr_slave_0 left promiscuous mode [ 367.437272][ T21] device hsr_slave_1 left promiscuous mode [ 367.484445][ T21] team0 (unregistering): Port device team_slave_1 removed [ 367.496175][ T21] team0 (unregistering): Port device team_slave_0 removed [ 367.506328][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 367.542310][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 367.614099][ T21] bond0 (unregistering): Released all slaves [ 367.733823][T22599] IPVS: ftp: loaded support on port[0] = 21 [ 367.798362][T22599] chnl_net:caif_netlink_parms(): no params data found [ 367.828766][T22599] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.836084][T22599] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.844747][T22599] device bridge_slave_0 entered promiscuous mode [ 367.852660][T22599] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.859868][T22599] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.867862][T22599] device bridge_slave_1 entered promiscuous mode [ 367.888088][T22599] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 367.898702][T22599] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 367.915992][T22599] team0: Port device team_slave_0 added [ 367.923278][T22599] team0: Port device team_slave_1 added [ 367.989011][T22599] device hsr_slave_0 entered promiscuous mode [ 368.037347][T22599] device hsr_slave_1 entered promiscuous mode [ 368.096994][T22599] debugfs: Directory 'hsr0' with parent '/' already present! [ 368.206722][T22599] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.214003][T22599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.221422][T22599] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.228578][T22599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.291522][T22599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.310472][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.325170][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.333554][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.351948][T22599] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.365615][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.375662][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.382794][T10224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.409757][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.419221][ T3015] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.426441][ T3015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.435692][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 368.462273][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 368.473045][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 368.484384][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.495608][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.510421][T22599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 368.540934][T22599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 368.689515][T22619] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:41 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:41 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:41 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:41 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)={0x0, 0x0}) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80)={0x0, r2+30000000}, 0x0, 0x0) 13:20:41 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:42 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:42 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000001d40)) 13:20:42 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) ppoll(&(0x7f0000001d00)=[{0xffffffffffffffff, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:42 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:43 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:43 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:43 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 13:20:43 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:43 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) ppoll(&(0x7f0000001d00)=[{0xffffffffffffffff, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:43 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:43 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) ppoll(&(0x7f0000001d00)=[{0xffffffffffffffff, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:44 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:44 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 371.467575][ T21] device bridge_slave_1 left promiscuous mode [ 371.473773][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.527593][ T21] device bridge_slave_0 left promiscuous mode [ 371.533854][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.647773][ T21] device hsr_slave_0 left promiscuous mode [ 372.687178][ T21] device hsr_slave_1 left promiscuous mode [ 372.733870][ T21] team0 (unregistering): Port device team_slave_1 removed [ 372.745531][ T21] team0 (unregistering): Port device team_slave_0 removed [ 372.755578][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 372.792396][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 372.883452][ T21] bond0 (unregistering): Released all slaves [ 372.971727][T22716] IPVS: ftp: loaded support on port[0] = 21 [ 373.045031][T22716] chnl_net:caif_netlink_parms(): no params data found [ 373.074421][T22716] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.081927][T22716] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.089603][T22716] device bridge_slave_0 entered promiscuous mode [ 373.097119][T22716] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.104244][T22716] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.112021][T22716] device bridge_slave_1 entered promiscuous mode [ 373.131882][T22716] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 373.142846][T22716] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 373.163067][T22716] team0: Port device team_slave_0 added [ 373.170352][T22716] team0: Port device team_slave_1 added [ 373.274240][T22716] device hsr_slave_0 entered promiscuous mode [ 373.367417][T22716] device hsr_slave_1 entered promiscuous mode 13:20:46 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 373.426990][T22716] debugfs: Directory 'hsr0' with parent '/' already present! [ 373.473206][T22716] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.480345][T22716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.487760][T22716] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.494846][T22716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.566947][T22716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 373.586341][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.605975][ T2421] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.614615][ T2421] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.631441][T22716] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.658007][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.670570][ T2421] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.677716][ T2421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.708106][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.716543][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.723741][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.745191][T22716] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 373.756204][T22716] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 373.769651][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.778755][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 373.787697][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.796183][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.816252][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 373.824781][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 373.834747][T22716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 373.985381][T22735] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:47 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:47 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:47 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:47 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:47 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:47 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:47 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:47 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:47 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:47 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) [ 375.757865][ T21] device bridge_slave_1 left promiscuous mode [ 375.764098][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.827687][ T21] device bridge_slave_0 left promiscuous mode [ 375.833882][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 13:20:49 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:49 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:49 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:49 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:49 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:50 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:50 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:50 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 377.197491][ T21] device hsr_slave_0 left promiscuous mode [ 377.251035][ T21] device hsr_slave_1 left promiscuous mode 13:20:50 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 377.295692][ T21] team0 (unregistering): Port device team_slave_1 removed [ 377.317125][ T21] team0 (unregistering): Port device team_slave_0 removed [ 377.329946][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 377.381824][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 13:20:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:50 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 377.558392][ T21] bond0 (unregistering): Released all slaves [ 377.704199][T22771] IPVS: ftp: loaded support on port[0] = 21 [ 377.773198][T22771] chnl_net:caif_netlink_parms(): no params data found [ 377.837558][T22771] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.847048][T22771] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.864791][T22771] device bridge_slave_0 entered promiscuous mode [ 377.872972][T22771] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.880314][T22771] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.888507][T22771] device bridge_slave_1 entered promiscuous mode [ 377.911124][T22771] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 377.922106][T22771] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 377.950335][T22771] team0: Port device team_slave_0 added [ 377.961993][T22771] team0: Port device team_slave_1 added [ 378.024221][T22771] device hsr_slave_0 entered promiscuous mode [ 378.127271][T22771] device hsr_slave_1 entered promiscuous mode [ 378.216986][T22771] debugfs: Directory 'hsr0' with parent '/' already present! [ 378.235573][T22771] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.242746][T22771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.250142][T22771] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.257245][T22771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.312287][T22771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 378.332746][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 378.347080][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.354773][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.367095][T22771] 8021q: adding VLAN 0 to HW filter on device team0 [ 378.378235][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.402475][ T2421] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.409615][ T2421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.431255][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.440329][ T2421] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.447448][ T2421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.467409][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 378.485129][T22771] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 378.496180][T22771] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 378.510531][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 378.519044][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 378.527607][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.536022][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 378.544597][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 378.570703][T22771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 378.676426][T22827] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:51 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:53 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:53 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:53 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:53 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:53 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:53 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 380.207603][ T21] device bridge_slave_1 left promiscuous mode [ 380.213867][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.267804][ T21] device bridge_slave_0 left promiscuous mode [ 380.274016][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 13:20:53 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000), 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:53 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:53 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:53 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:54 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000), 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 381.937391][ T21] device hsr_slave_0 left promiscuous mode [ 382.007102][ T21] device hsr_slave_1 left promiscuous mode [ 382.052303][ T21] team0 (unregistering): Port device team_slave_1 removed [ 382.064575][ T21] team0 (unregistering): Port device team_slave_0 removed [ 382.074072][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 382.141255][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 382.223407][ T21] bond0 (unregistering): Released all slaves [ 382.323591][T22878] IPVS: ftp: loaded support on port[0] = 21 [ 382.385250][T22878] chnl_net:caif_netlink_parms(): no params data found [ 382.412660][T22878] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.419880][T22878] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.427800][T22878] device bridge_slave_0 entered promiscuous mode [ 382.435518][T22878] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.442768][T22878] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.450711][T22878] device bridge_slave_1 entered promiscuous mode [ 382.467646][T22878] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 382.478251][T22878] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 382.496778][T22878] team0: Port device team_slave_0 added [ 382.503867][T22878] team0: Port device team_slave_1 added [ 382.569690][T22878] device hsr_slave_0 entered promiscuous mode [ 382.617228][T22878] device hsr_slave_1 entered promiscuous mode [ 382.656947][T22878] debugfs: Directory 'hsr0' with parent '/' already present! [ 382.705470][T22878] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.712601][T22878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.720013][T22878] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.727099][T22878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.785373][T22878] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.801497][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.815108][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.823715][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.842446][T22878] 8021q: adding VLAN 0 to HW filter on device team0 [ 382.858400][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.872137][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.879236][T10224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.044549][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 383.053936][T10228] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.061132][T10228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.075828][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 383.085153][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 383.105463][T22878] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 383.120017][T22878] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 383.134597][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 383.146305][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.156453][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 13:20:56 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:56 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:56 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:56 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000), 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:56 executing program 5: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r0, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) [ 383.290608][T22878] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 383.301046][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 383.610036][T22900] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:20:56 executing program 5: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r0, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:56 executing program 0: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:56 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:20:56 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:56 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{0x0}], 0x1) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:57 executing program 5: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r0, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 385.347589][ T3054] device bridge_slave_1 left promiscuous mode [ 385.353789][ T3054] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.397844][ T3054] device bridge_slave_0 left promiscuous mode [ 385.404118][ T3054] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.447180][ T3054] device hsr_slave_0 left promiscuous mode [ 386.499392][ T3054] device hsr_slave_1 left promiscuous mode 13:20:59 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:20:59 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:20:59 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, 0x0, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:59 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{0x0}], 0x1) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:20:59 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:20:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 386.555501][ T3054] team0 (unregistering): Port device team_slave_1 removed [ 386.571218][ T3054] team0 (unregistering): Port device team_slave_0 removed [ 386.581458][ T3054] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 386.680889][ T3054] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 386.853109][ T3054] bond0 (unregistering): Released all slaves 13:21:00 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{0x0}], 0x1) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:00 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:00 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:00 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:00 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:00 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 388.293729][T22985] IPVS: ftp: loaded support on port[0] = 21 [ 388.449466][T22985] chnl_net:caif_netlink_parms(): no params data found [ 388.482396][T22985] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.490455][T22985] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.500196][T22985] device bridge_slave_0 entered promiscuous mode [ 388.507838][T22985] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.514896][T22985] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.522918][T22985] device bridge_slave_1 entered promiscuous mode [ 388.538144][T22985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 388.548608][T22985] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 388.565119][T22985] team0: Port device team_slave_0 added [ 388.572406][T22985] team0: Port device team_slave_1 added [ 388.649702][T22985] device hsr_slave_0 entered promiscuous mode [ 388.717289][T22985] device hsr_slave_1 entered promiscuous mode [ 388.747016][T22985] debugfs: Directory 'hsr0' with parent '/' already present! [ 388.760802][T22985] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.767898][T22985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.775192][T22985] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.782285][T22985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.811773][T22985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 388.822730][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.831593][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.839278][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.847967][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 388.859100][T22985] 8021q: adding VLAN 0 to HW filter on device team0 [ 388.869503][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.878067][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.885128][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.894921][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.904427][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.911565][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.927706][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 388.936309][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 388.946230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 388.961917][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.970199][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.980026][T22985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 388.997749][T22985] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 389.099810][T22995] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:21:02 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, 0x0, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:02 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:02 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:02 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:02 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:03 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:03 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:03 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:03 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:03 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 390.601757][ T29] device bridge_slave_1 left promiscuous mode [ 390.637067][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.696701][ T29] device bridge_slave_0 left promiscuous mode [ 390.724536][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.917452][ T29] device hsr_slave_0 left promiscuous mode [ 391.957035][ T29] device hsr_slave_1 left promiscuous mode [ 392.032306][ T29] team0 (unregistering): Port device team_slave_1 removed [ 392.043644][ T29] team0 (unregistering): Port device team_slave_0 removed [ 392.053600][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 392.112211][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 392.191576][ T29] bond0 (unregistering): Released all slaves [ 392.263795][T23042] IPVS: ftp: loaded support on port[0] = 21 [ 392.325994][T23042] chnl_net:caif_netlink_parms(): no params data found [ 392.355610][T23042] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.362802][T23042] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.370483][T23042] device bridge_slave_0 entered promiscuous mode [ 392.379367][T23042] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.386466][T23042] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.394192][T23042] device bridge_slave_1 entered promiscuous mode [ 392.411115][T23042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 392.421763][T23042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 392.439187][T23042] team0: Port device team_slave_0 added [ 392.447504][T23042] team0: Port device team_slave_1 added [ 392.579769][T23042] device hsr_slave_0 entered promiscuous mode [ 392.627297][T23042] device hsr_slave_1 entered promiscuous mode [ 392.676964][T23042] debugfs: Directory 'hsr0' with parent '/' already present! [ 392.699760][T23042] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.706914][T23042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.714282][T23042] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.721395][T23042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.775671][T23042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 392.793863][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.802581][T10269] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.815683][T10269] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.828886][T23042] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.844518][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.853596][T10269] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.860738][T10269] bridge0: port 1(bridge_slave_0) entered forwarding state 13:21:06 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, 0x0, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:06 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:06 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:06 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 392.889843][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.898475][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.905521][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.913900][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 392.947879][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 392.965707][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 393.008717][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.032399][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.058613][T23042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 393.124687][T23042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 393.349748][T23070] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:21:06 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:06 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(0x0, &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:06 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(0x0, &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:06 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:07 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:07 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(0x0, &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 394.997868][ T3054] device bridge_slave_1 left promiscuous mode [ 395.004121][ T3054] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.058703][ T3054] device bridge_slave_0 left promiscuous mode [ 395.064924][ T3054] bridge0: port 1(bridge_slave_0) entered disabled state 13:21:09 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x0}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:09 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:09 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', 0x0, 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:09 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:09 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 396.067279][ T3054] device hsr_slave_0 left promiscuous mode [ 396.127073][ T3054] device hsr_slave_1 left promiscuous mode 13:21:09 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', 0x0, 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 396.224013][ T3054] team0 (unregistering): Port device team_slave_1 removed [ 396.274034][ T3054] team0 (unregistering): Port device team_slave_0 removed [ 396.370110][ T3054] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 396.471958][ T3054] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 13:21:09 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', 0x0, 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:09 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) [ 396.646318][ T3054] bond0 (unregistering): Released all slaves 13:21:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:10 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:10 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 397.888327][T23158] IPVS: ftp: loaded support on port[0] = 21 [ 397.948098][T23158] chnl_net:caif_netlink_parms(): no params data found [ 397.974407][T23158] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.981584][T23158] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.989621][T23158] device bridge_slave_0 entered promiscuous mode [ 397.997316][T23158] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.004422][T23158] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.012232][T23158] device bridge_slave_1 entered promiscuous mode [ 398.027141][T23158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 398.037859][T23158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 398.054470][T23158] team0: Port device team_slave_0 added [ 398.062175][T23158] team0: Port device team_slave_1 added [ 398.119725][T23158] device hsr_slave_0 entered promiscuous mode [ 398.177304][T23158] device hsr_slave_1 entered promiscuous mode [ 398.217013][T23158] debugfs: Directory 'hsr0' with parent '/' already present! [ 398.230912][T23158] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.238009][T23158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.245289][T23158] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.252382][T23158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.281728][T23158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 398.292963][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 398.301811][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.309436][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.319142][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 398.330066][T23158] 8021q: adding VLAN 0 to HW filter on device team0 [ 398.341049][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.349337][T10228] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.356391][T10228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.369982][T10269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 398.378325][T10269] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.385380][T10269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.408199][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 398.416562][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 398.425488][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 398.434269][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.442926][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 398.451730][T23158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 398.469241][T23158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 398.551789][T23166] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:21:12 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x0}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:12 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:12 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:12 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 13:21:12 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:12 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:13 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:13 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:13 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 400.528050][ T29] device bridge_slave_1 left promiscuous mode [ 400.534507][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.577951][ T29] device bridge_slave_0 left promiscuous mode [ 400.584334][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.607138][ T29] device hsr_slave_0 left promiscuous mode [ 401.647038][ T29] device hsr_slave_1 left promiscuous mode [ 401.692798][ T29] team0 (unregistering): Port device team_slave_1 removed [ 401.706330][ T29] team0 (unregistering): Port device team_slave_0 removed [ 401.716019][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 401.761243][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 401.844090][ T29] bond0 (unregistering): Released all slaves [ 401.943032][T23217] IPVS: ftp: loaded support on port[0] = 21 [ 402.004903][T23217] chnl_net:caif_netlink_parms(): no params data found [ 402.035016][T23217] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.042238][T23217] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.049941][T23217] device bridge_slave_0 entered promiscuous mode [ 402.057895][T23217] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.065001][T23217] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.072997][T23217] device bridge_slave_1 entered promiscuous mode [ 402.092165][T23217] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 402.102787][T23217] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 402.120809][T23217] team0: Port device team_slave_0 added [ 402.127909][T23217] team0: Port device team_slave_1 added [ 402.259608][T23217] device hsr_slave_0 entered promiscuous mode [ 402.357269][T23217] device hsr_slave_1 entered promiscuous mode [ 402.447345][T23217] debugfs: Directory 'hsr0' with parent '/' already present! [ 402.485048][T23217] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.492215][T23217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.499601][T23217] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.506677][T23217] bridge0: port 1(bridge_slave_0) entered forwarding state 13:21:15 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x0}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r3 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:15 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:15 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:15 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:21:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/171, 0xab}], 0x1}, 0x0) [ 402.548383][T23217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 402.624244][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.644351][ T2421] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.704995][ T2421] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.746690][T23217] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.765383][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.782846][ T2421] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.789974][ T2421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.849051][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.868352][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.875471][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.912476][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 402.932296][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 402.941795][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.954636][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.964276][T23217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.976603][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 402.993798][T23217] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 403.100862][T23246] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:21:16 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/171, 0xab}], 0x1}, 0x0) 13:21:16 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:16 executing program 0: 13:21:16 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:16 executing program 0: 13:21:16 executing program 4: [ 404.517872][ T29] device bridge_slave_1 left promiscuous mode [ 404.524112][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.577847][ T29] device bridge_slave_0 left promiscuous mode [ 404.584083][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.581405][ T29] device hsr_slave_0 left promiscuous mode [ 405.617003][ T29] device hsr_slave_1 left promiscuous mode [ 405.702529][ T29] team0 (unregistering): Port device team_slave_1 removed [ 405.718830][ T29] team0 (unregistering): Port device team_slave_0 removed [ 405.731734][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 13:21:18 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:18 executing program 4: 13:21:18 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{r1, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:19 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x2, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:19 executing program 0: 13:21:19 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) [ 405.770418][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 13:21:19 executing program 0: 13:21:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x40}, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB="00002994128125"], 0x2}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:21:19 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) [ 406.078383][ T29] bond0 (unregistering): Released all slaves 13:21:19 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x2, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\fc'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x400000000000000, &(0x7f0000000180)="02"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000900)='\r'}) 13:21:19 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x2, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:19 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:19 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x81, &(0x7f0000000180)=0xffff, &(0x7f0000000240)=0x2) request_key(&(0x7f0000000080)='big_key\x00', 0x0, 0x0, 0xfffffffffffffffe) 13:21:19 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x2, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:19 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00), 0x0, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) [ 407.084987][T23296] debugfs: File '23291' in directory 'proc' already present! [ 408.382503][T23340] IPVS: ftp: loaded support on port[0] = 21 [ 408.432799][T23340] chnl_net:caif_netlink_parms(): no params data found [ 408.456050][T23340] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.463841][T23340] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.471484][T23340] device bridge_slave_0 entered promiscuous mode [ 408.479845][T23340] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.487005][T23340] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.494596][T23340] device bridge_slave_1 entered promiscuous mode [ 408.509211][T23340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 408.519353][T23340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 408.535088][T23340] team0: Port device team_slave_0 added [ 408.542141][T23340] team0: Port device team_slave_1 added [ 408.599595][T23340] device hsr_slave_0 entered promiscuous mode [ 408.667186][T23340] device hsr_slave_1 entered promiscuous mode [ 408.757033][T23340] debugfs: Directory 'hsr0' with parent '/' already present! [ 408.770237][T23340] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.777335][T23340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.784594][T23340] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.791677][T23340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.818352][T23340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.830916][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.839132][T10228] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.846505][T10228] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.854501][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 408.865090][T23340] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.875219][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.883691][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.890759][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.900984][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.909720][T10228] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.916754][T10228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.932481][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 408.941245][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 408.951672][ T2421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 408.965296][T23340] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 408.976174][T23340] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 408.988212][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.996409][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.005016][T10228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 409.021818][T23340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 409.141644][T23347] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 13:21:22 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:22 executing program 0: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x0, [0x2c], [0xc1]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(r4, r0, 0x0, 0x0) 13:21:22 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:22 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:22 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00), 0x0, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x81, &(0x7f0000000180)=0xffff, &(0x7f0000000240)=0x2) request_key(&(0x7f0000000080)='big_key\x00', 0x0, 0x0, 0xfffffffffffffffe) 13:21:22 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00), 0x0, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1000000805, 0x0) r1 = socket$unix(0x1, 0x1000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) rename(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00') dup2(r0, r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:21:22 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{0xffffffffffffffff, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1000000805, 0x0) r1 = socket$unix(0x1, 0x1000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) rename(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00') dup2(r0, r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:21:23 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:23 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{0xffffffffffffffff, 0x10}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:23 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:23 executing program 2: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, 0x0, 0x0) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:23 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() keyctl$invalidate(0x15, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) r4 = dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {&(0x7f0000000340)="8adbd9ad0844b844de641cc646abc6a734ebd457a475476b48c1b30cb4a19768638296d367bb436484159edaf4", 0x2d, 0x3}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:23 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000880}, 0x10) semget$private(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = shmget(0x3, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000001c0)=""/153) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfd53, 0x0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="b4060000000000000a004e2400000006fe8800000000000000000000000001016d1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a004e240000000000000000000000000000ffff7f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000000000000000000000000000000000000010800000000000000000000000000000000000000000000000000000000000000000000000000000000008000"/400], 0x190) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080)="b4", 0x1, 0x0, 0x0, 0x0) 13:21:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4$tipc(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000001d00)=[{}], 0x1, &(0x7f0000001d80), 0x0, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="716995fb7a6ec50f420b38050512a419643fc7d86314aa9465e60fe124e33f36e916174c4b08119bb5118d1ef56191920669447b40555fc89a3fc153aab9173a1d8d7b1034171180056973e59c42975f4c154c28ce57431c7da4da4dda36cc4a15c73325c2825a4015dd0a0d7ba8b0c18c4a647a66076d323213f9d733a68d4822e434f9ec12c0c2883a4354e26ce8d9a570480002d87ff8d2017722e48c37b5950e6afec7d312bd7792f6dcc522421ded45c73f1d552084d60bd2372409473668ec3c9d811920085718aec894f651e2ddfbef1f65ac508826cc512da4617ee0c8bf1cde3749061cfe9dc59183", 0xed}], 0x1) 13:21:23 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x2, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) 13:21:23 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$invalidate(0x15, 0x0) timer_create(0x0, 0x0, &(0x7f0000044000)) clock_gettime(0x0, 0x0) readv(0xffffffffffffffff, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x2, &(0x7f0000000400)=[{&(0x7f0000000240)="d37060e1102646ed8a7f6328f7baec92a13bf3e32093ac7007cbf39bcf8349ebb22991809f6d504434b632f96d3697411bac1c28597a444795c23b2867c7b2ad06d445c37ee1cdea21274e0812f8689c4186cb614c36c80583b054342d110b6add4fc79e3027624e0192d28c61c66b1d6e1bdfe67c6b9d7ff2c4366cc3bf0987b814f9f088f73ba7a63116f39a4f3cb2b37f91a9bd4c791100b90287100fccebe4b5ecc00a20ad7e26c7ce46c4ec59cdef119821eeae93b92e7b31e38672", 0xbe, 0x1}, {0x0, 0x0, 0x9}], 0x0, &(0x7f0000000480)={[{@fragment_metadata='fragment=metadata'}, {@ssd='ssd'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>'}}]}) [ 410.963824][ C0] ------------[ cut here ]------------ [ 410.964245][T23417] ================================================================== [ 410.969567][ C0] refcount_t: increment on 0; use-after-free. [ 410.977431][T23417] BUG: KASAN: use-after-free in refcount_inc_not_zero_checked+0x81/0x200 [ 410.977444][T23417] Read of size 4 at addr ffff88806241d780 by task syz-executor.5/23417 [ 410.977448][T23417] [ 410.977461][T23417] CPU: 1 PID: 23417 Comm: syz-executor.5 Not tainted 5.3.0-rc3 #98 [ 410.977470][T23417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.977475][T23417] Call Trace: [ 410.977497][T23417] dump_stack+0x172/0x1f0 [ 410.977512][T23417] ? refcount_inc_not_zero_checked+0x81/0x200 [ 410.977530][T23417] print_address_description.cold+0xd4/0x306 [ 410.977544][T23417] ? refcount_inc_not_zero_checked+0x81/0x200 [ 410.977557][T23417] ? refcount_inc_not_zero_checked+0x81/0x200 [ 410.977573][T23417] __kasan_report.cold+0x1b/0x36 [ 410.977589][T23417] ? refcount_inc_not_zero_checked+0x81/0x200 [ 410.977606][T23417] kasan_report+0x12/0x17 [ 410.977622][T23417] check_memory_region+0x134/0x1a0 [ 410.977637][T23417] __kasan_check_read+0x11/0x20 [ 410.977652][T23417] refcount_inc_not_zero_checked+0x81/0x200 [ 410.977667][T23417] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 410.977685][T23417] ? __kasan_check_write+0x14/0x20 [ 410.977701][T23417] refcount_inc_checked+0x17/0x70 [ 410.977722][T23417] nr_release+0x62/0x3e0 [ 410.984199][ C0] WARNING: CPU: 0 PID: 23405 at lib/refcount.c:156 refcount_inc_checked+0x61/0x70 [ 410.992237][T23417] __sock_release+0xce/0x280 [ 411.000457][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 411.002791][T23417] sock_close+0x1e/0x30 [ 411.128045][T23417] __fput+0x2ff/0x890 [ 411.132037][T23417] ? __sock_release+0x280/0x280 [ 411.136890][T23417] ____fput+0x16/0x20 [ 411.140867][T23417] task_work_run+0x145/0x1c0 [ 411.145463][T23417] exit_to_usermode_loop+0x316/0x380 [ 411.150753][T23417] do_syscall_64+0x5a9/0x6a0 [ 411.155353][T23417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.161241][T23417] RIP: 0033:0x413511 [ 411.165134][T23417] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 411.184749][T23417] RSP: 002b:00007fff99f453d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 411.193174][T23417] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 411.201158][T23417] RDX: 0000001b33120000 RSI: 0000000000000000 RDI: 0000000000000003 [ 411.209138][T23417] RBP: 0000000000000001 R08: 00000000f810385f R09: 00000000f8103863 [ 411.217129][T23417] R10: 00007fff99f454b0 R11: 0000000000000293 R12: 000000000075c9a0 [ 411.225114][T23417] R13: 000000000075c9a0 R14: 0000000000760e38 R15: ffffffffffffffff [ 411.233110][T23417] [ 411.233137][ C0] CPU: 0 PID: 23405 Comm: syz-executor.4 Not tainted 5.3.0-rc3 #98 [ 411.235441][T23417] Allocated by task 23405: [ 411.243345][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.247749][T23417] save_stack+0x23/0x90 [ 411.247769][T23417] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 411.257822][ C0] Call Trace: [ 411.261989][T23417] kasan_kmalloc+0x9/0x10 [ 411.262007][T23417] __kmalloc+0x163/0x770 [ 411.267637][ C0] [ 411.270913][T23417] sk_prot_alloc+0x23a/0x310 [ 411.270931][T23417] sk_alloc+0x39/0xf70 [ 411.275255][ C0] dump_stack+0x172/0x1f0 [ 411.279468][T23417] nr_rx_frame+0x733/0x1e73 [ 411.279486][T23417] nr_loopback_timer+0x7b/0x170 [ 411.282335][ C0] ? refcount_inc_not_zero_checked+0x1f0/0x200 [ 411.286898][T23417] call_timer_fn+0x1ac/0x780 [ 411.286917][T23417] run_timer_softirq+0x697/0x17a0 [ 411.291109][ C0] panic+0x2dc/0x755 [ 411.295417][T23417] __do_softirq+0x262/0x98c [ 411.295428][T23417] [ 411.299931][ C0] ? add_taint.cold+0x16/0x16 [ 411.304745][T23417] Freed by task 23421: [ 411.304765][T23417] save_stack+0x23/0x90 [ 411.310916][ C0] ? __kasan_check_write+0x14/0x20 [ 411.315493][T23417] __kasan_slab_free+0x102/0x150 [ 411.315511][T23417] kasan_slab_free+0xe/0x10 [ 411.320542][ C0] ? __warn.cold+0x5/0x4c [ 411.324414][T23417] kfree+0x10a/0x2c0 [ 411.324432][T23417] __sk_destruct+0x4f7/0x6e0 [ 411.328925][ C0] ? __warn+0xe7/0x1e0 [ 411.331227][T23417] sk_destruct+0x86/0xa0 [ 411.331244][T23417] __sk_free+0xfb/0x360 [ 411.335915][ C0] ? refcount_inc_checked+0x61/0x70 [ 411.339961][T23417] sk_free+0x42/0x50 [ 411.339978][T23417] sock_efree+0x61/0x80 [ 411.344120][ C0] __warn.cold+0x20/0x4c [ 411.349314][T23417] skb_release_head_state+0xeb/0x250 [ 411.349333][T23417] skb_release_all+0x16/0x60 [ 411.354258][ C0] ? vprintk_emit+0x1ea/0x700 [ 411.358737][T23417] kfree_skb+0x101/0x3c0 [ 411.358757][T23417] nr_accept+0x56e/0x700 [ 411.363079][ C0] ? refcount_inc_checked+0x61/0x70 [ 411.366949][T23417] __sys_accept4+0x34e/0x6a0 [ 411.366968][T23417] __x64_sys_accept4+0x97/0xf0 [ 411.371547][ C0] report_bug+0x263/0x2b0 [ 411.375594][T23417] do_syscall_64+0xfd/0x6a0 [ 411.375616][T23417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.379853][ C0] do_error_trap+0x11b/0x200 [ 411.383972][T23417] [ 411.383990][T23417] The buggy address belongs to the object at ffff88806241d700 [ 411.383990][T23417] which belongs to the cache kmalloc-2k of size 2048 [ 411.389185][ C0] do_invalid_op+0x37/0x50 [ 411.393054][T23417] The buggy address is located 128 bytes inside of [ 411.393054][T23417] 2048-byte region [ffff88806241d700, ffff88806241df00) [ 411.393065][T23417] The buggy address belongs to the page: [ 411.397221][ C0] ? refcount_inc_checked+0x61/0x70 [ 411.401442][T23417] page:ffffea0001890700 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 compound_mapcount: 0 [ 411.406740][ C0] invalid_op+0x23/0x30 [ 411.411302][T23417] flags: 0x1fffc0000010200(slab|head) [ 411.411323][T23417] raw: 01fffc0000010200 ffffea00026f6288 ffffea0001a02888 ffff8880aa400e00 [ 411.416002][ C0] RIP: 0010:refcount_inc_checked+0x61/0x70 [ 411.420226][T23417] raw: 0000000000000000 ffff88806241c600 0000000100000003 0000000000000000 [ 411.424455][ C0] Code: 1d 4e ae 64 06 31 ff 89 de e8 6b 9e 35 fe 84 db 75 dd e8 22 9d 35 fe 48 c7 c7 40 03 c6 87 c6 05 2e ae 64 06 01 e8 e7 0f 07 fe <0f> 0b eb c1 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 41 [ 411.429621][T23417] page dumped because: kasan: bad access detected [ 411.429631][T23417] [ 411.434218][ C0] RSP: 0018:ffff8880ae809bf0 EFLAGS: 00010282 [ 411.438951][T23417] Memory state around the buggy address: [ 411.438965][T23417] ffff88806241d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 411.443285][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 411.447789][T23417] ffff88806241d700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.453666][ C0] RDX: 0000000000000100 RSI: ffffffff815c3ba6 RDI: ffffed1015d01370 [ 411.458241][T23417] >ffff88806241d780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.460560][ C0] RBP: ffff8880ae809c00 R08: ffff88805b466100 R09: fffffbfff134ae10 [ 411.474591][T23417] ^ [ 411.474608][T23417] ffff88806241d800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.479033][ C0] R10: fffffbfff134ae0f R11: ffffffff89a5707f R12: ffff88806241d780 [ 411.492394][T23417] ffff88806241d880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.498021][ C0] R13: ffff88806241d768 R14: ffff88808ffa6488 R15: ffff88808ffa6460 [ 411.503216][T23417] ================================================================== [ 411.540972][T23417] ------------[ cut here ]------------ [ 411.546686][ C0] ? vprintk_func+0x86/0x189 [ 411.566288][T23417] ODEBUG: activate not available (active state 0) object type: timer_list hint: nr_t1timer_expiry+0x0/0x340 [ 411.566606][T23417] WARNING: CPU: 1 PID: 23417 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 411.572843][ C0] nr_insert_socket+0x2d/0xe0 [ 411.575135][T23417] Modules linked in: [ 411.581240][ C0] nr_rx_frame+0x1605/0x1e73 [ 411.586857][T23417] CPU: 1 PID: 23417 Comm: syz-executor.5 Tainted: G B 5.3.0-rc3 #98 [ 411.586872][T23417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.594979][ C0] nr_loopback_timer+0x7b/0x170 [ 411.602926][T23417] RIP: 0010:debug_print_object+0x168/0x250 [ 411.602946][T23417] Code: dd 60 31 c6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 31 c6 87 48 c7 c7 60 26 c6 87 e8 70 cd 05 fe <0f> 0b 83 05 a3 73 67 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 411.611006][ C0] call_timer_fn+0x1ac/0x780 [ 411.618948][T23417] RSP: 0018:ffff88805c677af0 EFLAGS: 00010082 [ 411.627031][ C0] ? nr_process_rx_frame+0x1540/0x1540 [ 411.634976][T23417] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000000 [ 411.634993][T23417] RDX: 0000000000000000 RSI: ffffffff815c3ba6 RDI: ffffed100b8cef50 [ 411.639098][ C0] ? msleep_interruptible+0x150/0x150 [ 411.647125][T23417] RBP: ffff88805c677b30 R08: ffff88805c1da080 R09: fffffbfff11b4269 [ 411.647140][T23417] R10: fffffbfff11b4268 R11: ffffffff88da1343 R12: 0000000000000001 [ 411.655125][ C0] ? trace_hardirqs_on+0x5e/0x240 [ 411.663163][T23417] R13: ffffffff88db6560 R14: ffffffff8161da40 R15: 1ffff1100b8cef6c [ 411.663182][T23417] FS: 0000555557456940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 411.671259][ C0] ? _raw_spin_unlock_irq+0x28/0x90 [ 411.679309][T23417] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.679327][T23417] CR2: 00007fc73688ca20 CR3: 0000000098f37000 CR4: 00000000001406e0 [ 411.684818][ C0] ? nr_process_rx_frame+0x1540/0x1540 [ 411.689366][T23417] Call Trace: [ 411.689393][T23417] ? kasan_report+0x12/0x17 [ 411.702183][ C0] run_timer_softirq+0x697/0x17a0 [ 411.711734][T23417] debug_object_activate+0x2e5/0x470 [ 411.716408][ C0] ? add_timer+0x930/0x930 [ 411.720289][T23417] ? debug_object_init_on_stack+0x20/0x20 [ 411.724879][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.734150][T23417] ? do_raw_spin_lock+0x12a/0x2e0 [ 411.734184][T23417] mod_timer+0x452/0xc10 [ 411.744341][ C0] __do_softirq+0x262/0x98c [ 411.749204][T23417] ? mod_timer_pending+0xca0/0xca0 [ 411.755004][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 411.774595][T23417] ? check_memory_region+0x134/0x1a0 [ 411.774619][T23417] sk_reset_timer+0x24/0x60 [ 411.779252][ C0] irq_exit+0x19b/0x1e0 [ 411.785371][T23417] nr_start_t1timer+0x6e/0xa0 [ 411.790831][ C0] smp_apic_timer_interrupt+0x1a3/0x610 [ 411.798795][T23417] nr_release+0x1de/0x3e0 [ 411.806765][ C0] apic_timer_interrupt+0xf/0x20 [ 411.812127][T23417] __sock_release+0xce/0x280 [ 411.820114][ C0] [ 411.828100][T23417] sock_close+0x1e/0x30 [ 411.833117][ C0] RIP: 0010:update_stack_state+0x24/0x5f0 [ 411.841079][T23417] __fput+0x2ff/0x890 [ 411.841100][T23417] ? __sock_release+0x280/0x280 [ 411.850122][ C0] Code: 84 00 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 57 41 56 4c 8d b5 78 ff ff ff 49 c1 ee 03 41 55 49 89 fd 41 54 <49> 8d 0c 06 53 48 81 ec a0 00 00 00 48 c7 45 80 a7 6a 87 88 48 c7 [ 411.855323][T23417] ____fput+0x16/0x20 [ 411.862075][ C0] RSP: 0018:ffff8880647df5e8 EFLAGS: 00000a02 ORIG_RAX: ffffffffffffff13 [ 411.870048][T23417] task_work_run+0x145/0x1c0 [ 411.875489][ C0] RAX: dffffc0000000000 RBX: ffff8880647df728 RCX: ffff8880647df6a0 [ 411.878768][T23417] exit_to_usermode_loop+0x316/0x380 [ 411.883260][ C0] RDX: 1ffff1100c8fbee3 RSI: ffff8880647df7b0 RDI: ffff8880647df728 [ 411.888279][T23417] do_syscall_64+0x5a9/0x6a0 [ 411.893540][ C0] RBP: ffff8880647df608 R08: ffff8880647df750 R09: ffff8880647df780 [ 411.898059][T23417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.903753][ C0] R10: ffff8880647df750 R11: ffff8880647df760 R12: 1ffff1100c8fbec8 [ 411.909972][T23417] RIP: 0033:0x413511 [ 411.909991][T23417] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 411.914998][ C0] R13: ffff8880647df728 R14: 1ffff1100c8fbeb0 R15: ffff8880647df7b0 [ 411.919219][T23417] RSP: 002b:00007fff99f453d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 411.919240][T23417] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 411.923787][ C0] unwind_next_frame.part.0+0x1a9/0xa20 [ 411.928844][T23417] RDX: 0000001b33120000 RSI: 0000000000000000 RDI: 0000000000000003 [ 411.928859][T23417] RBP: 0000000000000001 R08: 00000000f810385f R09: 00000000f8103863 [ 411.933719][ C0] ? unwind_dump+0x100/0x100 [ 411.938972][T23417] R10: 00007fff99f454b0 R11: 0000000000000293 R12: 000000000075c9a0 [ 411.938987][T23417] R13: 000000000075c9a0 R14: 0000000000760e38 R15: ffffffffffffffff [ 411.943501][ C0] __unwind_start+0x1f6/0x3d0 [ 411.947620][T23417] irq event stamp: 0 [ 411.952290][ C0] ? profile_setup.cold+0xbb/0xbb [ 411.957805][T23417] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 411.957831][T23417] hardirqs last disabled at (0): [] copy_process+0x1815/0x6b00 [ 411.962144][ C0] arch_stack_walk+0x5e/0xf0 [ 411.967066][T23417] softirqs last enabled at (0): [] copy_process+0x18bc/0x6b00 [ 411.967083][T23417] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 411.971684][ C0] ? arch_stack_walk+0x5e/0xf0 [ 411.974606][T23417] ---[ end trace a13e03a4abc44d79 ]--- [ 412.228342][ C0] stack_trace_save+0xac/0xe0 [ 412.233034][ C0] ? stack_trace_consume_entry+0x190/0x190 [ 412.238855][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.245106][ C0] ? debug_smp_processor_id+0x3c/0x214 [ 412.250587][ C0] save_stack+0x23/0x90 [ 412.254758][ C0] ? perf_trace_run_bpf_submit+0x131/0x190 [ 412.260583][ C0] ? perf_trace_run_bpf_submit+0x131/0x190 [ 412.266410][ C0] ? perf_trace_run_bpf_submit+0x138/0x190 [ 412.272241][ C0] ? perf_trace_lock_acquire+0x361/0x530 [ 412.277881][ C0] ? __kasan_check_read+0x11/0x20 [ 412.282923][ C0] ? retint_kernel+0x2b/0x2b [ 412.287518][ C0] ? trace_hardirqs_on_caller+0x6a/0x240 [ 412.293173][ C0] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 412.298666][ C0] ? __this_cpu_preempt_check+0x3a/0x210 [ 412.304323][ C0] ? retint_kernel+0x2b/0x2b [ 412.308934][ C0] ? kasan_unpoison_shadow+0x35/0x50 [ 412.314236][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 412.319882][ C0] kasan_slab_alloc+0xf/0x20 [ 412.324478][ C0] __kmalloc+0x14c/0x770 [ 412.328734][ C0] ? mark_held_locks+0xf0/0xf0 [ 412.333521][ C0] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 412.339265][ C0] tomoyo_realpath_from_path+0xcd/0x7b0 [ 412.344823][ C0] ? tomoyo_path_number_perm+0x193/0x520 [ 412.350486][ C0] tomoyo_path_number_perm+0x1dd/0x520 [ 412.356050][ C0] ? tomoyo_path_number_perm+0x193/0x520 [ 412.361815][ C0] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 412.367650][ C0] ? __kasan_check_read+0x11/0x20 [ 412.372724][ C0] ? __fget+0x384/0x560 [ 412.376895][ C0] ? ksys_dup3+0x3e0/0x3e0 [ 412.381317][ C0] ? do_sys_open+0x31d/0x5d0 [ 412.385923][ C0] tomoyo_file_ioctl+0x23/0x30 [ 412.390706][ C0] security_file_ioctl+0x77/0xc0 [ 412.395661][ C0] ksys_ioctl+0x57/0xd0 [ 412.399828][ C0] __x64_sys_ioctl+0x73/0xb0 [ 412.404431][ C0] do_syscall_64+0xfd/0x6a0 [ 412.408950][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.414851][ C0] RIP: 0033:0x459697 [ 412.418757][ C0] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.438388][ C0] RSP: 002b:00007f4dfb91ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 412.446814][ C0] RAX: ffffffffffffffda RBX: 0000000020000458 RCX: 0000000000459697 [ 412.454815][ C0] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 412.462798][ C0] RBP: 0000000000000003 R08: 0000000000000000 R09: 000000000000000a [ 412.470782][ C0] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 412.478774][ C0] R13: 00000000004c8912 R14: 00000000004df720 R15: 00000000ffffffff [ 412.487814][ C0] Kernel Offset: disabled [ 412.492154][ C0] Rebooting in 86400 seconds..